Journal
IEEE ACCESS
Volume 5, Issue -, Pages 9131-9138Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2017.2705076
Keywords
Fog computing; security; ciphertext-policy attribute based encryption (CP-ABE); cloud computing; communications security
Categories
Funding
- Ministry of Higher Education, Saudi Arabia
- College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Saudi Arabia
- Saudi Arabian Monetary Authority
- National Natural Science Foundation of China [61602062]
- Natural Science Foundation of Jiangsu Province [BK20160410]
Ask authors/readers for more resources
Fog computing is deemed as a highly virtualized paradigm that can enable computing at the Internet of Things devices, residing in the edge of the network, for the purpose of delivering services and applications more efficiently and effectively. Since fog computing originates from and is a non-trivial extension of cloud computing, it inherits many security and privacy challenges of cloud computing, causing the extensive concerns in the research community. To enable authentic and confidential communications among a group of fog nodes, in this paper, we propose an efficient key exchange protocol based on ciphertext-policy attribute-based encryption (CP-ABE) to establish secure communications among the participants. To achieve confidentiality, authentication, verifiability, and access control, we combine CP-ABE and digital signature techniques. We analyze the efficiency of our protocol in terms of security and performance. We also implement our protocol and compare it with the certificate-based scheme to illustrate its feasibility.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available