International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)
Full Length Article

International Journal of Wireless and Ad Hoc Communication

Volume 2, Issue 2, PP: 59-67, 2021 | Cite this article as | XML | | Html PDF

Reliable Data Communication Model for Fog Computing

Reem Atassi   1 * , Aditi Sharma   2

  • 1 College of Computing Information Technology, American University in the Emirates, UAE - (ratassi@hct.ac.ae)
  • 2 IEEE Senior Member, Parul University, Vadodara, India;Department of Computer Science and Engineering, Parul Institute of Technology, India - (aditi11121986@gmail.com)
  • Doi: https://doi.org/10.54216/IJWAC.020202

    Received: February 08, 2021 Accepted: August 03, 2021
    Abstract

    To maintain data privacy and control who has access to what in the cloud, attribute-based encryption might be utilized. Attribute security is violated when apparent qualities are introduced to the encrypted message to assist people to identify necessary details in vast systems. To offer an effective attribute-based access control with an authorized search strategy, this research expands the anonymous key-policy attribute-based encryption (AKP-ABE) to provide fine-grained data retrieval while safeguarding attribute privacy (EACAS). In EACAS, data users may generate the trapdoor using the secret key supplied by data owners and conduct searches based on access restrictions to get the relevant data. Cryptographic protocols and trapdoor generation use a synthetic property devoid of syntactic significance to provide an attribute-based search on the exported encoded information in the fog. Data owners may implement granular access control on their outsourced data by establishing the search criteria that will be used by data consumers to locate relevant content based on protected attributes. We show that compared to the state-of-the-art methods, EACAS requires less time and space to process and store data. 

    Keywords :

    Access control , authorized search , cloud storage , data sharing , key-policy attribute-based encryption.

    References

    [1] “AWS IoT.” AWS. https://aws.amazon.com/ko/iot. (accessed Dec. 17, 2019)

    [2] “Cloud IoT Core.” Google Cloud. https://cloud.google.com/iotcore. (accessedDec. 17, 2019)

    [3] A. Sahai, B. Waters, “Fuzzy identity-based encryption,” Advances in Cryptology-EUROCRYPT, 2005,

    pp. 457–473.

    [4] J. Bettencourt, A. Sahai, B. Waters, “Ciphertext-policy attributebasedencryption,” In IEEE symposium on

    security and privacy (SP’07), 2007, pp. 321–334.

    [5] M. Green, S. Hohenberger, B. Waters, “Outsourcing the decryption of ABEciphertexts,” In USENIX

    Security Symposium, Vol. 2011, No. 3, 2001.

    [6] J. Lai, R. H. Deng, C. Guan, J. Weng, “Attribute-based encryption with verifiableoutsourced decryption,”

    IEEE Transactions on Information Forensics and Security,8(8), 2013, pp. 1343–1354.

    [7] S. Lin, R. Zhang, H. Ma, M. Wang, “Revisiting attribute-based encryption withverifiable outsourced

    decryption,” IEEE Transactions on Information Forensics andSecurity, 10(10), 2015, pp. 2119–2130.

    [8] S. Sours, I. P. Barco, P. Zwickl, I. Gojmerac, G. Bianchi, G. ˇ Carrozzo,“Towards the cross-domain

    interoperability of IoT platforms,” In EuropeanConference on Networks and Communications (EuCNC),

    2016, pp. 398–402.

    [9] C. Chen, Z. Zhang, D. Feng, “Efficient ciphertext policy attributebasedencryptionwith constant-size

    ciphertext and constant computation-cost,” In Provable Security,2011, pp. 84–101.

    [10] C. Hahn, H. Kwon, J. Hur, “Efficient attribute-based secure data sharing withhidden policies and

    traceability in mobile health networks,” Mobile InformationSystems, 2016.

    [11] Z. Zhou, D. Huang, Z. Wang, “Efficient privacy-preserving ciphertext-policyattribute based-encryption

    and broadcast encryption,” IEEE Transactions onComputers, 64(1), 2015, pp. 126–138.

    [12] Z. Zhou, D. Huang, “On efficient ciphertext-policy attribute based encryptionand broadcast encryption,”

    In Proceedings of the 17th ACM conference on Computerand communications security, 2010, pp. 753–

    755.

    [13] Shang, W., Bann’s, A., Liang, T., Wang, Z., Yu, Y., Afanasyev, A., and Zhang,L., “Named data

    networking of things,” In IEEE First International Conference onInternet-of-Things Design and

    Implementation (IoTDI), 2016, pp. 117–128.

    [14] Gibb, J., Buyya, R., Maurice, S., and Palaniswami, M., “Internet of Things (IoT): A vision, architectural

    elements, and future directions,” Future generationcomputer systems, 29(7), 2013, pp. 1645–1660.

    [15] Ghose, A., Biswas, P., Bhaumik, C., Sharma, M., Pal, A., and Jha, A., “Roadcondition monitoring and

    alert application: Using invehicle smartphone as internet -connected sensor,” In IEEE International

    Conference on Pervasive Computing andCommunications Workshops (PERCOM Workshops), 2012, pp.

    489–491.

    [16] Li, J., Sha, F., Zhang, Y., Huang, X., and Shen, J., “Verifiable outsourceddecryption of attribute-based

    encryption with constant ciphertext length,” Securityand Communication Networks, 2017.

    [17] Y. Jiang, W. Susilo, Y. Mu, F. Guo, “Ciphertext-policy attributebasedencryptionagainst key-delegation

    abuse in fog computing,” Future Generation ComputerSystems,78, 2017, pp. 720–729.

    [18] Y. B. Saied, A. Livereaf, D. Zeghlache, M. Laurent, “Lightweight collaborativekey establishment scheme

    for the Internet of Things,” Computer Networks, 64, 2014,pp. 273–295.

    [19] M. J. Hinek, S. Jiang, R. Safavi-Naini, S. F. Shahandashti, “Attribute-basedencryption with key cloning

    protection,” International Journal of AppliedCryptography, 2(3), 2012, pp. 250–270.

    [20] S. Yu, K. Ren, W. Lou, J. Li, “Defending against key abuse attacks in KP –ABEenabled broadcast

    systems,” In International Conference on Security and Privacy inCommunication Systems, 2009, pp.

    311–329.

    [21] J. Li, Q. Huang, X. Chen, S. S. Chow, D. S. Wong, D. Xie, “Multi-authorityciphertext-policy attributebased

    encryption with accountability,” In Proceedings ofthe 6th ACM Symposium on Information,

    Computer and Communications Security,2011, pp. 386–390.

    [22] Z. Liu, Z. Cao, D. S. Wong, “Blackbox traceable CP-ABE: how to catch peopleleaking their keys by

    selling decryption devices on ebay,” In Proceedings of the ACMSIGSAC conference on Computer &

    communications security, 2013, pp. 475–486.

    [23] J. Ning, Z. Cao, X. Dong, L. Wei, X. Lin, “Large universe ciphertext–policyattribute-based encryption

    with white-box traceability,” In European Symposium onResearch in Computer Security, 2014, pp. 55–

    72.

    [24] G. Yu, Z. Cao, G. Zeng, W. Han, “Accountable ciphertext-policy attribute-basedencryption scheme

    supporting public verifiability and nonrepudiation,” InInternational Conference on Provable Security,

    2016, pp. 3–18.

    [25] J. King, Z. Cao, X. Dong, J. Gong, J. Chen, “Traceable CP -ABE with shortciphertexts: how to catch

    people selling decryption devices on eBay efficiently,” InEuropean Symposium on Research in Computer

    Security, 2016, pp. 551–569

    Cite This Article As :
    Reem Atassi, Aditi Sharma. "Reliable Data Communication Model for Fog Computing." Full Length Article, Vol. 2, No. 2, 2021 ,PP. 59-67 (Doi   :  https://doi.org/10.54216/IJWAC.020202)
    Reem Atassi, Aditi Sharma. (2021). Reliable Data Communication Model for Fog Computing. Journal of , 2 ( 2 ), 59-67 (Doi   :  https://doi.org/10.54216/IJWAC.020202)
    Reem Atassi, Aditi Sharma. "Reliable Data Communication Model for Fog Computing." Journal of , 2 no. 2 (2021): 59-67 (Doi   :  https://doi.org/10.54216/IJWAC.020202)
    Reem Atassi, Aditi Sharma. (2021). Reliable Data Communication Model for Fog Computing. Journal of , 2 ( 2 ), 59-67 (Doi   :  https://doi.org/10.54216/IJWAC.020202)
    Reem Atassi, Aditi Sharma. Reliable Data Communication Model for Fog Computing. Journal of , (2021); 2 ( 2 ): 59-67 (Doi   :  https://doi.org/10.54216/IJWAC.020202)
    Reem Atassi, Aditi Sharma, Reliable Data Communication Model for Fog Computing, Journal of , Vol. 2 , No. 2 , (2021) : 59-67 (Doi   :  https://doi.org/10.54216/IJWAC.020202)