Abstract | ||
---|---|---|
Fog computing is deemed as a highly virtualized paradigm that can enable computing at the Internet of Things devices, residing in the edge of the network, for the purpose of delivering services and applications more efficiently and effectively. Since fog computing originates from and is a non-trivial extension of cloud computing, it inherits many security and privacy challenges of cloud computing, causing the extensive concerns in the research community. To enable authentic and confidential communications among a group of fog nodes, in this paper, we propose an efficient key exchange protocol based on ciphertext-policy attribute-based encryption (CP-ABE) to establish secure communications among the participants. To achieve confidentiality, authentication, verifiability, and access control, we combine CP-ABE and digital signature techniques. We analyze the efficiency of our protocol in terms of security and performance. We also implement our protocol and compare it with the certificate-based scheme to illustrate its feasibility. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1109/ACCESS.2017.2705076 | IEEE ACCESS |
Keywords | Field | DocType |
Fog computing,security,ciphertext-policy attribute based encryption (CP-ABE),cloud computing,communications security | Edge computing,Authentication,Computer science,Computer security,Attribute-based encryption,Computer network,Encryption,Digital signature,Cloud computing security,Utility computing,Cloud computing | Journal |
Volume | ISSN | Citations |
5 | 2169-3536 | 12 |
PageRank | References | Authors |
0.52 | 17 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Arwa Alrawais | 1 | 124 | 10.08 |
Abdulrahman Alhothaily | 2 | 104 | 6.31 |
Chunqiang Hu | 3 | 407 | 31.79 |
Xiaoshuang Xing | 4 | 257 | 14.07 |
Xiuzhen Cheng | 5 | 3238 | 210.23 |