KEY MANAGEMENT SCHEME KEY MANAGEMENT SCHEME FOR SECURE CHANNEL ESTABLISHMENT IN FOG COMPUTING

Main Article Content

SRINIVAS GOUD AMBATI
G.RANI
NENAVATHU GOPAL
DHEERAJ RAO
BODA MOHAN KRISHNA GOUD

Abstract

Abstract - Fog computing is a promising extension of cloud computing, and enables computing directly at the edge of the network. Due to the decentralized and distributed nature of fog nodes, secure communication channels have to be supported in fog computing, which are generally realized through secure keys. Key management schemes are usually employed to generate, distribute and maintain the secret keys. In this paper, we propose a key management scheme called dynamic contributory broadcast encryption (DConBE) for secure channel establishment in fog computing. It allows a group of fog nodes that want to establish a fog system to negotiate a public encryption key and each node’s decryption key in one round without a trusted dealer. Any end user may encrypt messages under the public encryption key with short ciphertexts to any subset of the fog nodes in the system. Only selected fog nodes in the system can decrypt the encrypted messages using their respective decryption key. Our new key management scheme also achieves the properties of fog node dynamics, fully collusion-resistant and stateless.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
AMBATI, S. G., RANI, G. NENAVATHU, DHEERAJ RAO, and M. K. BODA. “KEY MANAGEMENT SCHEME KEY MANAGEMENT SCHEME FOR SECURE CHANNEL ESTABLISHMENT IN FOG COMPUTING”. Technix International Journal for Engineering Research, vol. 9, no. 6, June 2022, pp. 45-47, https://tijer.org/index.php/tijer/article/view/178.
Dimension
Section
Research Articles

References

J. Li, L. Zhang, K. Liu, H. Qian, and Z. Dong, “Privacy-Preserving Public Auditing Protocol for Low Performance End Devices in Cloud,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2572–2583, 2016.

L. Zhang, and J. Li, “Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing,” IEEE Access, vol. 6, pp. 50384–50393, 2018.

M. Chiang, and T. Zhang, “Fog and IoT: An Overview of Research Opportunities,” IEEE Internet of Things Journal, vol. 3, no. 6, pp. 854–864, 2016.

L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, and C. Hu, “Distributed Aggregate Privacy-Preserving Authentication in VANETs,” IEEE Transactions on Intelligent Transportation Systems, vol. 18, no. 3, pp. 516–526, 2017.

J. Liu, J. Li, L. Zhang, F. Dai, Y. Zhang, X. Meng, and J. Shen, “Secure Intelligent Traffic Light Control Using Fog Computing,” Future Generation Computer Systems, vol. 78, part 2, pp. 817-824, 2018.