Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme

被引:13
|
作者
Shruti [1 ,2 ]
Rani, Shalli [2 ]
Srivastava, Gautam [3 ,4 ,5 ]
机构
[1] Goswami Ganesh Dutta Sanatan Dharma Coll, Chandigarh, India
[2] Chitkara Univ, Chitkara Univ Inst Engn & Technol, Rajpura, Punjab, India
[3] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut 1102, Lebanon
[4] China Med Univ, Res Ctr Interneural Comp, Taichung 40402, Taiwan
[5] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
关键词
Industry; 5.0; Smart industry; Fog computing; Internet of things (IoT); Sensors; Smart energy supply system; SMART CITIES; IOT DATA; EDGE;
D O I
10.1016/j.eswa.2023.121180
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Industry 5.0 is an emerging phase in the industrial field where humans and the latest technologies work together to bring revolutionary changes to work processes. It is the future of the upcoming generation for smart city development. Operations and designing of smart systems for Industrial Internet of Things (IIoT) devices include various types of decision-making at different levels of domains. Highly complex systems have a huge number of variables and decision-making requirements which also needs real-time data gathering from IIoT devices. Fog computing performs a key role by locating IIoT devices close to its proximity and reducing the processing time in comparison to cloud computing for smart systems. It makes smart systems work in a secure, flexible and time-sensitive manner. The presence of sensors makes data-intensive analysis challenging in these systems but fog computing handles it all. Along with other challenges, security is also one of the concerns that can affect the overall system if compromised. The main objective of this article is to introduce hierarchical fog computing-based architecture for smart energy-supplying systems as a part of Industry 5.0. This architecture will be able to support a large number of infrastructural components and provide services efficiently. In this article, validation of the amount of data transmitted by IIoT devices to the cloud per second is done for three different cases: 1. The proposed four-layer fog computing architecture, 2. Fog architecture with only layer three layers with the rest of the computing on the cloud, 3. A traditional system with cloud computing. The proposed approach is validated over state of art approaches in terms of accuracy. Moreover, the security of the architecture is provided using the Attribute-based encryption (ABE) scheme, which ensures data confidentiality with minimum overhead.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] An Attribute-Based Encryption Scheme to Secure Fog Communications
    Alrawais, Arwa
    Alhothaily, Abdulrahman
    Hu, Chunqiang
    Xing, Xiaoshuang
    Cheng, Xiuzhen
    [J]. IEEE ACCESS, 2017, 5 : 9131 - 9138
  • [2] A Hierarchical Attribute-Based Encryption Scheme
    ZOU Xiubin
    [J]. Wuhan University Journal of Natural Sciences, 2013, 18 (03) : 259 - 264
  • [3] Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
    Huang, Qinlong
    Yang, Yixian
    Shen, Mansuo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 239 - 249
  • [4] Adaptively secure multi-authority attribute-based broadcast encryption in fog computing
    Chen, Jie
    Niu, Jiaxu
    Lei, Hao
    Lin, Li
    Ling, Yunhao
    [J]. COMPUTER NETWORKS, 2023, 232
  • [5] A Secure Fog-cloud Architecture using Attribute-based Encryption for the Medical Internet of Things (MIoT)
    Alshehri, Suhair
    Almehmadi, Tahani
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (12) : 924 - 933
  • [6] A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
    Fu, Junsong
    Wang, Na
    [J]. IEEE ACCESS, 2019, 7 : 36218 - 36232
  • [7] A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing
    Tu, Shanshan
    Waqas, Muhammad
    Huang, Fengming
    Abbas, Ghulam
    Abbas, Ziaul Haq
    [J]. COMPUTER NETWORKS, 2021, 195
  • [8] A fully distributed hierarchical attribute-based encryption scheme
    Ali, Mohammad
    Mohajeri, Javad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 815 : 25 - 46
  • [9] Dual Attribute-Based Auditing Scheme for Fog Computing-Based Data Dynamic Storage With Distributed Collaborative Verification
    Gu, Ke
    Zhang, Wenbin
    Wang, Xingqiang
    Li, Xiong
    Jia, Weijia
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (04): : 4982 - 4999
  • [10] Security analyses of a data collaboration scheme with hierarchical attribute-based encryption in cloud computing
    Tai, Wei-Liang
    Chang, Ya-Fen
    Huang, Wen-Hsin
    [J]. International Journal of Network Security, 2020, 22 (02): : 212 - 217