The fog computing model has given new trends of networking with different types of devices providing services at the end‐user point. It inherits most advanced features of cloud computing with localization rather than centralization like a cloud. It builds a platform for the Internet of things of different standards. Similar to the cloud, it is prone to privacy and security threat while sharing resources and services at the network edge. When the request for support is with more sensitive data, for example, as in business or research area, then fog devices face many potential threats resulting in leakage of data. The existing cloud environment provides data sharing service to the legal requestor in a highly secured manner using cryptographic encryption techniques. The uploaded data undergoes encryption and decryption, at the sending and receiving end only on providing the private key. Even more, security can be achieved by further computation on encrypted data. As an extension to fog computing, the data communication between fog nodes‐fog nodes and fog node‐cloud center is done with encryption/decryption for ensuring confidentiality. Homomorphic encryption is a cryptographic technique which allows performing computations on encrypted data without decryption so that the original message need not be disclosed to intermediates (servers) who are the only service provider and not a data user. Our work is motivated by the flaw of security issues in fog computing platforms, which involve heterogeneous devices.
The advent of the internet of things (IoT) links millions of computers and sensors to each other, generating a massive volume of data, but due to latency, bandwidth and storage issues some computational paradigm is required near the edge devices. Within the IoT, fog computing offers computation, storage, and network resources to end-users. The assurance of protection is important because the services of fog computing are available to a wide number of IoT customers. This paper proposes an effective authentication and secure data access between fog and IoT users to achieve authentication and access to data and also a cipher policy-based homomorphic Paillier encryption (CP-HPE), for secure data access between fog node and user. The security and performance analysis show the scheme is apt for fog computing with IoT environment.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.