Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Whaiduzzaman, Mda; b; * | Farjana, Nishatb | Barros, Alistaira | Mahi, Md. Julkar Nayeenb | Satu, Md. Shahriareb | Roy, Shantob | Fidge, Colinc
Affiliations: [a] School of Information Systems, Queensland University of Technology, Brisbane, Australia. E-mails: wzaman@juniv.edu, alistair.barros@qut.edu.au | [b] Institute of Information Technology, Jahangirnagar University, Savar, Dhaka-1342, Bangaldesh. E-mails: nishatfarjana34@gmail.com, mahi.1992@gmail.com, shahriarsetu.mis@nstu.edu.bd, shantoroy@ieee.org | [c] School of Computer Science, Queensland University of Technology, Brisbane, Australia. E-mail: c.fidge@qut.edu.au
Correspondence: [*] Corresponding author. E-mail: wzaman@juniv.edu.
Abstract: Fog computing complemented cloud computing integration services in the Internet of Things (IoT) and the web of real-time interactivity. Fog offers faster computing and other services facilities sitting close to user applications. However, secure data transfer in the fog is still a challenging issue requiring attention and efficient deployment of a secure data security scheme. We present an Identity Based Encryption (IBE) scheme to secure data security and transmission in fog clouds and IoT ecosystems. We devise and develop a four-level Hierarchical Identity Based Architecture for Fog Computing (HIBAF) data security scheme to enhance data security. We also analyze the system’s performance regarding response time, CPU utilization, run-time encryption-decryption, and key generation time in the fog computing paradigm to an increasing number of users data-loads. Moreover, we evaluate our scheme and compare the outcomes with different cryptography structures to discern our scheme’s effectiveness. Furthermore, we also evaluate secret key updating time, re-encrypted key updating time, and file revoking time by launching DDoS attacks both in the cloud and fog computing environment to compare improvements of HIBAF in the fog computing paradigm. Finally, through this overall evaluation, we have found that the developed HIBAF scheme provides a 33% performance enhancement in a fog environment in terms of data processing, provision, and management compared to the cloud environment.
Keywords: Fog computing, cloud computing, data security, identity based integration, cryptographic scheme
DOI: 10.3233/JHS-210673
Journal: Journal of High Speed Networks, vol. 27, no. 4, pp. 381-402, 2021
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl