Preserving data security in distributed fog computing

被引:31
|
作者
Noura, Hassan [1 ]
Salman, Ola [1 ]
Chehab, Ali [1 ]
Couturier, Raphael [2 ]
机构
[1] Amer Univ Beirut, Elect & Comp Engn, Beirut, Lebanon
[2] Univ Bourgogne Franche Comt, FEMTO ST Inst, CNRS, Belfort, France
关键词
PRIVACY; MANAGEMENT; SCHEME;
D O I
10.1016/j.adhoc.2019.101937
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel cryptographic solution is proposed to secure data in fog computing. The solution combines the AES-GMAC operation mode with information dispersal over GF(2(w)) to provide data confidentiality, integrity, and availability along with source authentication. The value of w is flexible (8, 16, 32 or 64) and it could be configured according to the fog device features. Moreover, the proposed cryptographic solution is based on the dynamic key-dependent approach, which allows for a good compromise between the security level and computational complexity. In the proposed solution, the collected data at one fog node is encrypted, authenticated and dispersed in a pseudo-random manner to its n neighbor fog nodes. For data recovery, any k of the n fragments along with the corresponding dynamic key are required to retrieve the original data. This complicates the attackers task who needs to compromise at least k fog nodes to disclose the encrypted data. Additionally, attackers should seek the dynamic key, which is different for each input data. On the other hand, redundant fragments protect the stored data against up to (n - k) fog nodes' failure or unavailability. The security and performance analysis tests show that the proposed security scheme exhibits a high level of efficiency and robustness. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Privacy-Preserving Deduplication of Sensor Compressed Data in Distributed Fog Computing
    Zhang, Chen
    Miao, Yinbin
    Xie, Qingyuan
    Guo, Yu
    Du, Hongwei
    Jia, Xiaohua
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 33 (12) : 4176 - 4191
  • [2] Data Security and Privacy in Fog Computing
    Guan, Yunguo
    Shao, Jun
    Wei, Guiyi
    Xie, Mande
    [J]. IEEE NETWORK, 2018, 32 (05): : 106 - 111
  • [3] Privacy-Preserving Data Preprocessing for Fog Computing in 5G Network Security
    Xu, Shengjie
    Qian, Yi
    Hu, Rose Qingyang
    [J]. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [4] HIBAF: A data security scheme for fog computing
    Whaiduzzaman, Md
    Farjana, Nishat
    Barros, Alistair
    Mahi, Md Julkar Nayeen
    Satu, Md Shahriare
    Roy, Shanto
    Fidge, Colin
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2021, 27 (04) : 381 - 402
  • [5] Towards Distributed Data Management in Fog Computing
    Moysiadis, Vasileios
    Sarigiannidis, Panagiotis
    Moscholios, Ioannis
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [6] Analysis on homomorphic technique for data security in fog computing
    Murugesan, Arun
    Saminathan, Balamurali
    Al-Turjman, Fadi
    Kumar, R. Lakshmana
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (09):
  • [7] FogStore: Toward a Distributed Data Store for Fog Computing
    Mayer, Ruben
    Gupta, Harshit
    Saurez, Enrique
    Ramachandran, Umakishore
    [J]. 2017 IEEE FOG WORLD CONGRESS (FWC), 2017, : 128 - 133
  • [8] Fog Computing Middleware for Distributed Cooperative Data Analytics
    Clemente, Jose
    Valero, Maria
    Mohammadpour, Javad
    Li, Xiangyang
    Song, WenZhan
    [J]. 2017 IEEE FOG WORLD CONGRESS (FWC), 2017, : 116 - 121
  • [9] Distributed Management Scheme of Sensing Data for Fog Computing
    Song, You-Jin
    [J]. ADVANCED SCIENCE LETTERS, 2017, 23 (10) : 9543 - 9546
  • [10] Fog computing-based privacy preserving data aggregation protocols
    Okay, Feyza Yildirim
    Ozdemir, Suat
    Xiao, Yang
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (04)