Footsteps in the fog: Certificateless fog-based access control

نویسندگان

چکیده

The proliferating adoption of the Internet Things (IoT) paradigm has fuelled need for more efficient and resilient access control solutions that aim to prevent unauthorized resource access. majority existing works in this field follow either a centralized approach (i.e. cloud-based) or an architecture where IoT devices are responsible all decision-making functions. Furthermore, resource-constrained nature most make securing communication between these cloud using standard cryptographic difficult. In paper, we propose distributed core components fog nodes cloud. To facilitate secure communication, our utilizes Certificateless Hybrid Signcryption scheme without pairing. We prove effectiveness by providing comparative analysis its performance comparison commonly used cloud-based architectures. Our implementation uses Azure – commercial platform, Keycloak open-source demonstrate real-world applicability. Additionally, measure adopted encryption on two types further emphasize applicability proposed architecture. Finally, experimental results coupled with theoretical proves security approach.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access Control in Utilizing Fog Computing for Transport Infrastructure

The integration of the information and communication technologies of cloud computing, Software Defined Networking (SDN) and Internet of Things (IoT) into traditional transportation infrastructures enables the evolution of Intelligent Transportation Systems (ITS). Moreover, the specific requirements for real-time applications and service provision near to consumers introduce the utilization of f...

متن کامل

Resource Allocation in NOMA based Fog Radio Access Networks

In the wake of growth in intelligent mobile devices and wide usage of bandwidth-hungry applications of mobile Internet, the demand of wireless data traffic and ubiquitous mobile broadband is rapidly increasing. On account of these developments, the research on fifth generation (5G) networks presents an accelerative tendency on a global scale. Edge computing draw lots of attention for reducing t...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

Fog Mesh Studies for Fog Removal

Field tests concerning a fog mesh method for fog removal are discussed. The first tests were performed at the Pyhäsalmi Mine, Finland. As this study gave promising results, further studies were completed at the Orivesi Mine. The results of these most recent field tests are presented and the two studies are compared. The Orivesi test set consisted of four materials. These included air filter fab...

متن کامل

Fog radio access network system control scheme based on the embedded game model

As a promising paradigm for the 5G wireless communication system, a new evolution of the cloud radio access networks has been proposed, named as fog radio access networks (F-RANs). It is an advanced socially aware mobile networking architecture to provide a high spectral and energy efficiency while reducing backhaul burden. In particular, F-RANs take full advantages of social information and ed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers & Security

سال: 2022

ISSN: ['0167-4048', '1872-6208']

DOI: https://doi.org/10.1016/j.cose.2022.102866