Open Access   Article Go Back

A Review on various secure data access schemes and techniques in Fog for Internet of Things

Ravula Arun Kumar1 , Kambalapally Vinuthna2

  1. Koneru Lakshmaiah Education Foundation, Vijayawada, India.
  2. Koneru Lakshmaiah Education Foundation, Vijayawada, India.

Correspondence should be addressed to: arunravula12@gmail.com.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-1 , Page no. 151-155, Jan-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.151155

Online published on Jan 31, 2018

Copyright © Ravula Arun Kumar, Kambalapally Vinuthna . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ravula Arun Kumar, Kambalapally Vinuthna, “A Review on various secure data access schemes and techniques in Fog for Internet of Things,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.151-155, 2018.

MLA Style Citation: Ravula Arun Kumar, Kambalapally Vinuthna "A Review on various secure data access schemes and techniques in Fog for Internet of Things." International Journal of Computer Sciences and Engineering 6.1 (2018): 151-155.

APA Style Citation: Ravula Arun Kumar, Kambalapally Vinuthna, (2018). A Review on various secure data access schemes and techniques in Fog for Internet of Things. International Journal of Computer Sciences and Engineering, 6(1), 151-155.

BibTex Style Citation:
@article{Kumar_2018,
author = {Ravula Arun Kumar, Kambalapally Vinuthna},
title = {A Review on various secure data access schemes and techniques in Fog for Internet of Things},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2018},
volume = {6},
Issue = {1},
month = {1},
year = {2018},
issn = {2347-2693},
pages = {151-155},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1650},
doi = {https://doi.org/10.26438/ijcse/v6i1.151155}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.151155}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1650
TI - A Review on various secure data access schemes and techniques in Fog for Internet of Things
T2 - International Journal of Computer Sciences and Engineering
AU - Ravula Arun Kumar, Kambalapally Vinuthna
PY - 2018
DA - 2018/01/31
PB - IJCSE, Indore, INDIA
SP - 151-155
IS - 1
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
705 385 downloads 257 downloads
  
  
           

Abstract

Fog computing Provides extending feature for proper Infrastructure, Storage, Computation and services that bring cloud to the edge of network theory, fortunately or unfortunately cloud-Iot Aches from various issues such as network latency, Volume of data uploaded and the data being accessed, privacy and security. There are many schemes and methods that giving the solutions for the research being carried out in iot security, however the practical issues are still exist and in this paper the various schemes such as Distributed computing, Edge computing, homomorphic encryption, fine grained privacy preservation technique, attribute based encryption and other schemes which relates to security are reviewed and check the nature of cloud-iot based encryption schemes, In the meantime the analogy of secure access for proposed schemes such as confidentiality, availability, privacy and Integrity that securely meet the requirements of security in fog and internet of things. The Methodology is find to be metric and generic and it possess a wide range of applications and topologies with respect to networking and security. Now shall be addressing the various research techniques in order to review the security concerns in fog, cloud-IoT

Key-Words / Index Term

Distributed computing, key delegation, Edge computing, CP-ABE, homomorphic encryption, Hierarchical abe, fine grained privacy preservation technique

References

[1] Chen, Y. C., Chang, Y. C., Chen, C. H., Lin, Y. S., Chen, J. L., & Chang, Y. Y. (2017, May). Cloud-fog computing for information-centric Internet-of-Things applications. In Applied System Innovation (ICASI), 2017 International Conference on (pp. 637-640). IEEE.
[2] Alotaibi, Asma, Ahmed Barnawi, and Mohammed Buhari. "Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing." Journal of Information Security 8.03 (2017): 203.
[3] Koo, D., Shin, Y., Yun, J., & Hur, J. (2016, December). A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing. In Cloud Computing Technology and Science (CloudCom), 2016 IEEE International Conference on (pp. 285-293). IEEE.
[4] Su, J., Cao, D., Zhao, B., Wang, X., & You, I. (2014). ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things. Future Generation Computer Systems, 33, 11-18.
[5] Deng, R., Lu, R., Lai, C., Luan, T. H., & Liang, H. (2016). Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption. IEEE Internet of Things Journal, 3(6), 1171-1181.
[6] Liu, Y., Dong, B., Guo, B., Yang, J., & Peng, W. (2015). Combination of cloud computing and internet of things (IOT) in medical monitoring systems. International Journal of Hybrid Information Technology, 8(12), 367-376.
[7] Khairnar, Sonali, and Dhanashree Borkar. "Fog Computing: A New Concept To Minimize The Attacks And To Provide Security In Cloud Computing Environment." IJRET: International Journal of Research in Engineering and Technology 3.06 (2014).
[8] Zouari, Jaweher, Mohamed Hamdi, and Tai-Hoon Kim. "A privacy-preserving homomorphic encryption scheme for the Internet of Things." Wireless Communications and Mobile Computing Conference (IWCMC), 2017 13th International. IEEE, 2017.
[9] Yang, Xue, Fan Yin, and Xiaohu Tang. "A Fine-Grained and Privacy

-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service." Sensors 17.7 (2017): 1611.
[10] Yang, Lei, Abdulmalik Humayed, and Fengjun Li. "A multi-cloud based privacy-preserving data publishing scheme for the internet of things." Proceedings of the 32nd Annual Conference on Computer Security Applications. ACM, 2016.
[11] Vishwanath, Akhilesh, Ramya Peruri, and Jing (Selena) He. Security in fog computing through encryption. DigitalCommons@ Kennesaw State University, 2016.
[12] Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., & Yao, X. (2017). Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet of Things Journal.
[13] Jiang, Y., Susilo, W., Mu, Y., & Guo, F. (2017). Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Generation Computer Systems.
[14] Huang, Qinlong, Licheng Wang, and Yixian Yang. "DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices." World Wide Web (2017): 1-17.
[15] Alrawais, A., Alhothaily, A., Hu, C., Xing, X., & Cheng, X. (2017). An Attribute-Based Encryption Scheme to Secure Fog Communications. IEEE Access.
[16] Huang, Qinlong, Yixian Yang, and Licheng Wang. "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things." IEEE Access 5 (2017): 12941-12950.
[17]Taneja, Mohit, and Alan Davy. "Resource aware placement of IoT application modules in Fog-Cloud Computing Paradigm." Integrated Network and Service Management (IM), 2017 IFIP/IEEE Symposium on. IEEE, 2017.
[18] Lu, R., Heung, K., Lashkari, A. H., & Ghorbani, A. A. (2017). A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT. IEEE Access, 5, 3302-3312.
[19] Luigi Atzori a, Antonio Iera b, Giacomo Morabito c,* The Internet of Things: A survey, Computer Networks 54 (2010) 2787–2805
[20] Dan Boneh, Matthew Frankliny, Identity-Based Encryption from the Weil Pairing Appears in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
[21] Mrinmoy Barua*, Xiaohui Liang, Rongxing Lu and Xuemin Shen, ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing, Int. J. Security and Networks, Vol. 6, Nos. 2/3, 2011