Analysis on homomorphic technique for data security in fog computing

The fog computing model has given new trends of networking with different types of devices providing services at the end‐user point. It inherits most advanced features of cloud computing with localization rather than centralization like a cloud. It builds a platform for the Internet of things of dif...

Full description

Saved in:
Bibliographic Details
Published inTransactions on emerging telecommunications technologies Vol. 32; no. 9
Main Authors Murugesan, Arun, Saminathan, Balamurali, Al‐Turjman, Fadi, Kumar, R. Lakshmana
Format Journal Article
LanguageEnglish
Published Chichester, UK John Wiley & Sons, Ltd 01.09.2021
Online AccessGet full text

Cover

Loading…
More Information
Summary:The fog computing model has given new trends of networking with different types of devices providing services at the end‐user point. It inherits most advanced features of cloud computing with localization rather than centralization like a cloud. It builds a platform for the Internet of things of different standards. Similar to the cloud, it is prone to privacy and security threat while sharing resources and services at the network edge. When the request for support is with more sensitive data, for example, as in business or research area, then fog devices face many potential threats resulting in leakage of data. The existing cloud environment provides data sharing service to the legal requestor in a highly secured manner using cryptographic encryption techniques. The uploaded data undergoes encryption and decryption, at the sending and receiving end only on providing the private key. Even more, security can be achieved by further computation on encrypted data. As an extension to fog computing, the data communication between fog nodes‐fog nodes and fog node‐cloud center is done with encryption/decryption for ensuring confidentiality. Homomorphic encryption is a cryptographic technique which allows performing computations on encrypted data without decryption so that the original message need not be disclosed to intermediates (servers) who are the only service provider and not a data user. Our work is motivated by the flaw of security issues in fog computing platforms, which involve heterogeneous devices.
ISSN:2161-3915
2161-3915
DOI:10.1002/ett.3990