Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme

被引:23
|
作者
Shruti [1 ,2 ]
Rani, Shalli [2 ]
Srivastava, Gautam [3 ,4 ,5 ]
机构
[1] Goswami Ganesh Dutta Sanatan Dharma Coll, Chandigarh, India
[2] Chitkara Univ, Chitkara Univ Inst Engn & Technol, Rajpura, Punjab, India
[3] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut 1102, Lebanon
[4] China Med Univ, Res Ctr Interneural Comp, Taichung 40402, Taiwan
[5] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
关键词
Industry; 5.0; Smart industry; Fog computing; Internet of things (IoT); Sensors; Smart energy supply system; SMART CITIES; IOT DATA; EDGE;
D O I
10.1016/j.eswa.2023.121180
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Industry 5.0 is an emerging phase in the industrial field where humans and the latest technologies work together to bring revolutionary changes to work processes. It is the future of the upcoming generation for smart city development. Operations and designing of smart systems for Industrial Internet of Things (IIoT) devices include various types of decision-making at different levels of domains. Highly complex systems have a huge number of variables and decision-making requirements which also needs real-time data gathering from IIoT devices. Fog computing performs a key role by locating IIoT devices close to its proximity and reducing the processing time in comparison to cloud computing for smart systems. It makes smart systems work in a secure, flexible and time-sensitive manner. The presence of sensors makes data-intensive analysis challenging in these systems but fog computing handles it all. Along with other challenges, security is also one of the concerns that can affect the overall system if compromised. The main objective of this article is to introduce hierarchical fog computing-based architecture for smart energy-supplying systems as a part of Industry 5.0. This architecture will be able to support a large number of infrastructural components and provide services efficiently. In this article, validation of the amount of data transmitted by IIoT devices to the cloud per second is done for three different cases: 1. The proposed four-layer fog computing architecture, 2. Fog architecture with only layer three layers with the rest of the computing on the cloud, 3. A traditional system with cloud computing. The proposed approach is validated over state of art approaches in terms of accuracy. Moreover, the security of the architecture is provided using the Attribute-based encryption (ABE) scheme, which ensures data confidentiality with minimum overhead.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] ABDKS: attribute-based encryption with dynamic keyword search in fog computing
    Fei Meng
    Leixiao Cheng
    Mingqiang Wang
    Frontiers of Computer Science, 2021, 15
  • [22] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Wu, Zhiwei
    Shi, Run-hua
    Li, Kunchang
    Yang, Yifan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 3899 - 3913
  • [23] Partial policy hiding attribute-based encryption in vehicular fog computing
    Gan, Tingyun
    Liao, Yongjian
    Liang, Yikuan
    Zhou, Zijun
    Zhang, Ganglin
    SOFT COMPUTING, 2021, 25 (16) : 10543 - 10559
  • [24] Attribute-based Encryption Scheme with Fast Encryption
    一种支持快速加密的基于属性加密方案
    Feng, Chao-Sheng (csfenggy@126.com), 1600, Chinese Academy of Sciences (31): : 3923 - 3936
  • [25] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    Fu, Jing-Yi
    Huang, Qin-Long
    Ma, Zhao-Feng
    Yang, Yi-Xian
    Journal of China Universities of Posts and Telecommunications, 2014, 21 (06): : 45 - 51
  • [26] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    FU Jingyi
    HUANG Qinlong
    MA Zhaofeng
    YANG Yixian
    The Journal of China Universities of Posts and Telecommunications, 2014, 21 (06) : 45 - 51+77
  • [27] Attribute-Based Encryption Scheme Based on SIFF
    Zhao, Tianyu
    Wei, Lingbo
    Zhang, Chi
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [28] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    FU Jing-yi
    HUANG Qin-long
    MA Zhao-feng
    YANG Yi-xian
    The Journal of China Universities of Posts and Telecommunications, 2014, (06) : 45 - 51
  • [29] A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption
    Yang, Tonghao
    Li, Junquan
    Yu, Bin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [30] A Secure Scheme for Storage, Retrieval, and Sharing of Digital Documents in Cloud Computing Using Attribute-Based Encryption on Mobile Devices
    Morales-Sandoval, Miguel
    Karina Vega-Castillo, Ana
    Diaz-Perez, Arturo
    INFORMATION SECURITY JOURNAL, 2014, 23 (1-2): : 22 - 31