Key Management Scheme for Secure Channel Establishment in Fog Computing
Fog computing is a promising extension of cloud computing, and enables computing directly at the edge of the network. Due to the decentralized and distributed nature of fog nodes, secure communication channels have to be supported in fog computing, which are generally realized through secure keys. K...
Saved in:
Published in | IEEE transactions on cloud computing Vol. 9; no. 3; pp. 1117 - 1128 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE Computer Society
01.07.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Fog computing is a promising extension of cloud computing, and enables computing directly at the edge of the network. Due to the decentralized and distributed nature of fog nodes, secure communication channels have to be supported in fog computing, which are generally realized through secure keys. Key management schemes are usually employed to generate, distribute and maintain the secret keys. In this paper, we propose a key management scheme called dynamic contributory broadcast encryption (DConBE) for secure channel establishment in fog computing. It allows a group of fog nodes that want to establish a fog system to negotiate a public encryption key and each node's decryption key in one round without a trusted dealer. Any end user may encrypt messages under the public encryption key with short ciphertexts to any subset of the fog nodes in the system. Only selected fog nodes in the system can decrypt the encrypted messages using their respective decryption key. Our new key management scheme also achieves the properties of fog node dynamics, fully collusion-resistant and stateless. |
---|---|
AbstractList | Fog computing is a promising extension of cloud computing, and enables computing directly at the edge of the network. Due to the decentralized and distributed nature of fog nodes, secure communication channels have to be supported in fog computing, which are generally realized through secure keys. Key management schemes are usually employed to generate, distribute and maintain the secret keys. In this paper, we propose a key management scheme called dynamic contributory broadcast encryption (DConBE) for secure channel establishment in fog computing. It allows a group of fog nodes that want to establish a fog system to negotiate a public encryption key and each node’s decryption key in one round without a trusted dealer. Any end user may encrypt messages under the public encryption key with short ciphertexts to any subset of the fog nodes in the system. Only selected fog nodes in the system can decrypt the encrypted messages using their respective decryption key. Our new key management scheme also achieves the properties of fog node dynamics, fully collusion-resistant and stateless. |
Author | Zhang, Lei |
Author_xml | – sequence: 1 givenname: Lei orcidid: 0000-0001-8786-4562 surname: Zhang fullname: Zhang, Lei email: leizhang@sei.ecnu.edu.cn organization: Shanghai Key Laboratory of Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Shanghai, China |
BookMark | eNp9kDtPwzAQxy1UJErpjsRiiTnFj8SPEUVtQRQxtMyWk1zaVK1dnGTot8elFQMDt9wN_4fud4sGzjtA6J6SCaVEP63yfMII1ROmCWdZeoWGjEuWEELVIN5UqERSQW_QuG23JI7KqKZ6iOZvcMTv1tk17MF1eFlu4oFrH_ASyj4AzjfWOdjhadvZYte0mx9d4_DMr3Hu94e-a9z6Dl3XdtfC-LJH6HM2XeUvyeJj_po_L5KSadolpawlK5SU2gJkHFIAQdIqq1ml6kpDBaSESvCKEpsxSOsiq0ShFFFcW8UFH6HHc-4h-K8e2s5sfR9crDQsEzFYciWjipxVZfBtG6A2h9DsbTgaSsyJmInEzImYuRCLFvHHUjad7RrvumCb3X_Gh7OxAYDfHiXiX1Lwb4smeXo |
CODEN | ITCCF6 |
CitedBy_id | crossref_primary_10_1016_j_future_2023_10_023 crossref_primary_10_1155_2021_5895809 crossref_primary_10_1109_TIFS_2023_3286712 crossref_primary_10_1109_TDSC_2021_3138445 crossref_primary_10_3390_sym15020299 crossref_primary_10_21015_vtcs_v11i1_1521 crossref_primary_10_1016_j_csi_2023_103819 crossref_primary_10_1109_TSC_2019_2937764 crossref_primary_10_1016_j_comnet_2024_110641 crossref_primary_10_1109_ACCESS_2021_3113649 crossref_primary_10_9728_dcs_2024_25_7_1919 crossref_primary_10_1016_j_asej_2021_05_018 crossref_primary_10_1109_JIOT_2019_2948622 crossref_primary_10_1109_ACCESS_2021_3103725 crossref_primary_10_1109_TCC_2020_3008795 crossref_primary_10_1109_TSC_2023_3250705 crossref_primary_10_1109_TWC_2020_2975781 crossref_primary_10_1016_j_vehcom_2019_03_003 crossref_primary_10_1515_comp_2020_0167 crossref_primary_10_1109_JIOT_2021_3050562 crossref_primary_10_3390_en16073208 crossref_primary_10_1109_TDSC_2024_3359240 crossref_primary_10_1155_2019_2423915 crossref_primary_10_3390_s23094198 crossref_primary_10_1109_TIFS_2024_3356809 crossref_primary_10_1080_03772063_2021_1893842 |
Cites_doi | 10.1007/3-540-45682-1_18 10.1109/CloudCom.2016.0054 10.1007/978-3-642-38348-9_1 10.1109/TIFS.2016.2587242 10.1109/TIFS.2014.2388156 10.1016/j.future.2017.02.017 10.1109/TIFS.2015.2447933 10.1007/3-540-46035-7_21 10.1186/s13638-018-1289-9 10.1007/978-3-642-32928-9_10 10.1109/JIOT.2016.2584538 10.1109/ACCESS.2018.2868920 10.1109/TDSC.2015.2399299 10.1007/978-3-642-01001-9_9 10.1007/978-3-642-54631-0_4 10.1007/978-3-642-14031-0_54 10.1109/MIC.2017.37 10.1007/978-3-642-25385-0_8 10.6028/NIST.SP.800-145 10.1016/j.future.2016.11.009 10.1090/conm/324/05731 10.1109/TC.2015.2419662 10.1109/TC.2015.2485225 10.1007/978-3-540-73489-5_4 10.1007/11426639_26 10.1109/TDSC.2018.2797190 10.1007/978-3-540-30539-2_18 10.1016/j.future.2017.01.024 10.1007/978-3-540-24676-3_13 10.1016/j.vehcom.2019.03.003 10.1007/11535218_16 10.1145/1180405.1180432 10.1109/TIT.2008.920224 10.1145/2342509.2342513 10.1007/978-3-319-11212-1_6 10.1007/978-3-662-49890-3_21 10.1007/BFb0053443 10.1007/978-3-319-21837-3_67 10.1016/j.future.2016.10.028 10.1109/TITS.2016.2579162 10.1007/978-3-642-01001-9_10 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TCC.2019.2903254 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE/IET Electronic Library CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2372-0018 |
EndPage | 1128 |
ExternalDocumentID | 10_1109_TCC_2019_2903254 8660476 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Key Research and Development Program of China grantid: 2017YFB0802000 funderid: 10.13039/501100012166 – fundername: National Natural Science Foundation of China; NSF of China grantid: 61572198; 61321064 funderid: 10.13039/501100001809 – fundername: Fundamental Research Funds for the Central Universities funderid: 10.13039/501100012226 |
GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD HZ~ IEDLZ IFIPE IPLJI JAVBF M43 O9- OCL PQQKQ RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c291t-c7f72b8779aee53e4ee604d5f2d8fd9ede0ced63d10a52e4fb5d6b880839a8363 |
IEDL.DBID | RIE |
ISSN | 2168-7161 |
IngestDate | Mon Jun 30 06:35:36 EDT 2025 Tue Jul 01 02:57:15 EDT 2025 Thu Apr 24 22:56:30 EDT 2025 Wed Aug 27 02:27:20 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c291t-c7f72b8779aee53e4ee604d5f2d8fd9ede0ced63d10a52e4fb5d6b880839a8363 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-8786-4562 |
PQID | 2568777387 |
PQPubID | 2040413 |
PageCount | 12 |
ParticipantIDs | crossref_primary_10_1109_TCC_2019_2903254 crossref_citationtrail_10_1109_TCC_2019_2903254 proquest_journals_2568777387 ieee_primary_8660476 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-07-01 |
PublicationDateYYYYMMDD | 2021-07-01 |
PublicationDate_xml | – month: 07 year: 2021 text: 2021-07-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE transactions on cloud computing |
PublicationTitleAbbrev | TCC |
PublicationYear | 2021 |
Publisher | IEEE Computer Society The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE Computer Society – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 ref14 ref11 ref10 ref17 ref19 ref18 ref46 ref45 ref48 ref47 ref41 ref44 naor (ref37) 2000 ref49 ref7 ref9 ref3 ref6 ref40 turner (ref5) 0 ref35 (ref43) 0 ref34 ref36 ref31 ref33 meulen (ref4) 2015 ref32 ref2 ref1 ref39 ref38 dodis (ref21) 2002 nakamoto (ref16) 2009 fiat (ref8) 1993 boneh (ref30) 2002; 324 ref24 ref23 ref26 ref25 ref20 ref28 ref27 ref29 kim (ref22) 2015; 10 (ref42) 0 |
References_xml | – ident: ref33 doi: 10.1007/3-540-45682-1_18 – ident: ref27 doi: 10.1109/CloudCom.2016.0054 – ident: ref31 doi: 10.1007/978-3-642-38348-9_1 – ident: ref2 doi: 10.1109/TIFS.2016.2587242 – volume: 10 start-page: 679 year: 2015 ident: ref22 article-title: Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2014.2388156 – ident: ref11 doi: 10.1016/j.future.2017.02.017 – ident: ref41 doi: 10.1109/TIFS.2015.2447933 – start-page: 480 year: 1993 ident: ref8 article-title: Broadcast encryption publication-title: Proc Annu Int Cryptology Conf – ident: ref34 doi: 10.1007/3-540-46035-7_21 – year: 2009 ident: ref16 article-title: Bitcoin: A peer-to-peer electronic cash system – ident: ref44 doi: 10.1186/s13638-018-1289-9 – ident: ref38 doi: 10.1007/978-3-642-32928-9_10 – ident: ref7 doi: 10.1109/JIOT.2016.2584538 – ident: ref6 doi: 10.1109/ACCESS.2018.2868920 – ident: ref13 doi: 10.1109/TDSC.2015.2399299 – start-page: 61 year: 2002 ident: ref21 article-title: Public key broadcast encryption for stateless receivers publication-title: Proc Secur Privacy Digit Rights Manage – ident: ref39 doi: 10.1007/978-3-642-01001-9_9 – ident: ref47 doi: 10.1007/978-3-642-54631-0_4 – ident: ref40 doi: 10.1007/978-3-642-14031-0_54 – ident: ref25 doi: 10.1109/MIC.2017.37 – ident: ref14 doi: 10.1007/978-3-642-25385-0_8 – year: 0 ident: ref5 publication-title: Reducing the Time to Value for Internet of Things Deployments – ident: ref1 doi: 10.6028/NIST.SP.800-145 – ident: ref26 doi: 10.1016/j.future.2016.11.009 – volume: 324 start-page: 71 year: 2002 ident: ref30 article-title: Applications of multilinear forms to cryptography publication-title: Contemporary Math doi: 10.1090/conm/324/05731 – ident: ref15 doi: 10.1109/TC.2015.2419662 – ident: ref9 doi: 10.1109/TC.2015.2485225 – ident: ref20 doi: 10.1007/978-3-540-73489-5_4 – start-page: 1 year: 2000 ident: ref37 article-title: Efficient trace and revoke schemes publication-title: Proc Int Conf Financial Cryptography – ident: ref49 doi: 10.1007/11426639_26 – ident: ref3 doi: 10.1109/TDSC.2018.2797190 – ident: ref35 doi: 10.1007/978-3-540-30539-2_18 – ident: ref28 doi: 10.1016/j.future.2017.01.024 – ident: ref45 doi: 10.1007/978-3-540-24676-3_13 – ident: ref17 doi: 10.1016/j.vehcom.2019.03.003 – ident: ref18 doi: 10.1007/11535218_16 – year: 0 ident: ref43 article-title: Multiprecision integer and rational arithmetic publication-title: C++ library (miracl) – year: 0 ident: ref42 – ident: ref19 doi: 10.1145/1180405.1180432 – ident: ref36 doi: 10.1109/TIT.2008.920224 – ident: ref23 doi: 10.1145/2342509.2342513 – ident: ref46 doi: 10.1007/978-3-319-11212-1_6 – year: 2015 ident: ref4 article-title: Gartner says 6.4 billion connected "things" will be in use in 2016, up 30 percent from 2015 – ident: ref32 doi: 10.1007/978-3-662-49890-3_21 – ident: ref12 doi: 10.1007/BFb0053443 – ident: ref24 doi: 10.1007/978-3-319-21837-3_67 – ident: ref29 doi: 10.1016/j.future.2016.10.028 – ident: ref10 doi: 10.1109/TITS.2016.2579162 – ident: ref48 doi: 10.1007/978-3-642-01001-9_10 |
SSID | ssj0000851919 |
Score | 2.5304682 |
Snippet | Fog computing is a promising extension of cloud computing, and enables computing directly at the edge of the network. Due to the decentralized and distributed... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1117 |
SubjectTerms | access control Algorithms blockchain broadcast encryption Cloud computing Collaboration Edge computing Encryption Information security Messages Nodes secure group communication Security management Vehicle dynamics |
Title | Key Management Scheme for Secure Channel Establishment in Fog Computing |
URI | https://ieeexplore.ieee.org/document/8660476 https://www.proquest.com/docview/2568777387 |
Volume | 9 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB50T15cn7i6Sg5eBNtt06ZNjrK4iqInhb2VpJmoKF3R3YP-epP0IT4Qb4Em7TCTdL6ZzAPg0KChqBkPUCtroHBkgchkGkhlbQ8UKUa5SxS-us7Ob9OLKZsuwXGXC4OIPvgMQzf0d_l6Vi6cq2zEsyxK82wZlq3hVudqdf4UBx1ELNqbyEiMbsZjF7olQiqihLL0i-bxrVR-_H-9Upn04aolp44leQwXcxWW798qNf6X3jVYbdAlOam3wzosYbUB_bZzA2kO8iacXeIb-Yx8sQ_u7YBYAEu8Ax6Jyzqo8ImcWvToHVV-3kNFJrM7Ur_QKr0tuJ2c3ozPg6alQlBSEc-DMjc5VTzPhURkCaaIlkTNDNXcaIEaoxJ1lug4koxiahTTmbJn3OIoyZMs2YZeNatwBwg1SmvDmY5lkoqYy8gkTCr7ASl4yekARi27i7KpN-7aXjwV3u6IRGEFVDgBFY2ABnDUrXiua238MXfT8bub17B6AMNWokVzGF8Li-pc1cOE57u_r9qDFepCVXwU7hB685cF7lusMVcHfpN9APFU0lE |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGGDhjShPDyxIpE2cOLFHVFHKo0xFYovs-AwIlCJoB_j12E5SxEOIzVLOiXXny30-3wPg0KChqBkPUCt7QOHIApHKJJDKnj1QJBhmLlF4cJ32b5KLW3Y7A8fTXBhE9MFn2HZDf5evR8XEuco6PE3DJEtnYd7afRZV2VpTj4oDDyISzV1kKDrDbtcFb4k2FWFMWfLF9vhmKj_-wN6s9JZh0CyoiiZ5bE_Gql28f6vV-N8Vr8BSjS_JSbUhVmEGyzVYbno3kFqV1-HsEt_IZ-yLfXBvB8RCWOJd8Ehc3kGJT-TU4kfvqvJ0DyXpje5I9UJr9jbgpnc67PaDuqlCUFARjYMiMxlVPMuERGQxJoh2iZoZqrnRAjWGBeo01lEoGcXEKKZTZbXcIinJ4zTehLlyVOIWEGqU1oYzHck4ERGXoYmZVPYDUvCC0xZ0GnbnRV1x3DW-eMr9ySMUuRVQ7gSU1wJqwdF0xnNVbeMP2nXH7yldzeoW7DYSzWt1fM0trnN1D2Oebf8-6wAW-sPBVX51fn25A4vUBa74mNxdmBu_THDPIo-x2vcb7gMUA9Wa |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Key+Management+Scheme+for+Secure+Channel+Establishment+in+Fog+Computing&rft.jtitle=IEEE+transactions+on+cloud+computing&rft.au=Zhang%2C+Lei&rft.date=2021-07-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2372-0018&rft.volume=9&rft.issue=3&rft.spage=1117&rft_id=info:doi/10.1109%2FTCC.2019.2903254&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-7161&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-7161&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-7161&client=summon |