Key Management Scheme for Secure Channel Establishment in Fog Computing

Fog computing is a promising extension of cloud computing, and enables computing directly at the edge of the network. Due to the decentralized and distributed nature of fog nodes, secure communication channels have to be supported in fog computing, which are generally realized through secure keys. K...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on cloud computing Vol. 9; no. 3; pp. 1117 - 1128
Main Author Zhang, Lei
Format Journal Article
LanguageEnglish
Published Piscataway IEEE Computer Society 01.07.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Fog computing is a promising extension of cloud computing, and enables computing directly at the edge of the network. Due to the decentralized and distributed nature of fog nodes, secure communication channels have to be supported in fog computing, which are generally realized through secure keys. Key management schemes are usually employed to generate, distribute and maintain the secret keys. In this paper, we propose a key management scheme called dynamic contributory broadcast encryption (DConBE) for secure channel establishment in fog computing. It allows a group of fog nodes that want to establish a fog system to negotiate a public encryption key and each node's decryption key in one round without a trusted dealer. Any end user may encrypt messages under the public encryption key with short ciphertexts to any subset of the fog nodes in the system. Only selected fog nodes in the system can decrypt the encrypted messages using their respective decryption key. Our new key management scheme also achieves the properties of fog node dynamics, fully collusion-resistant and stateless.
AbstractList Fog computing is a promising extension of cloud computing, and enables computing directly at the edge of the network. Due to the decentralized and distributed nature of fog nodes, secure communication channels have to be supported in fog computing, which are generally realized through secure keys. Key management schemes are usually employed to generate, distribute and maintain the secret keys. In this paper, we propose a key management scheme called dynamic contributory broadcast encryption (DConBE) for secure channel establishment in fog computing. It allows a group of fog nodes that want to establish a fog system to negotiate a public encryption key and each node’s decryption key in one round without a trusted dealer. Any end user may encrypt messages under the public encryption key with short ciphertexts to any subset of the fog nodes in the system. Only selected fog nodes in the system can decrypt the encrypted messages using their respective decryption key. Our new key management scheme also achieves the properties of fog node dynamics, fully collusion-resistant and stateless.
Author Zhang, Lei
Author_xml – sequence: 1
  givenname: Lei
  orcidid: 0000-0001-8786-4562
  surname: Zhang
  fullname: Zhang, Lei
  email: leizhang@sei.ecnu.edu.cn
  organization: Shanghai Key Laboratory of Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Shanghai, China
BookMark eNp9kDtPwzAQxy1UJErpjsRiiTnFj8SPEUVtQRQxtMyWk1zaVK1dnGTot8elFQMDt9wN_4fud4sGzjtA6J6SCaVEP63yfMII1ROmCWdZeoWGjEuWEELVIN5UqERSQW_QuG23JI7KqKZ6iOZvcMTv1tk17MF1eFlu4oFrH_ASyj4AzjfWOdjhadvZYte0mx9d4_DMr3Hu94e-a9z6Dl3XdtfC-LJH6HM2XeUvyeJj_po_L5KSadolpawlK5SU2gJkHFIAQdIqq1ml6kpDBaSESvCKEpsxSOsiq0ShFFFcW8UFH6HHc-4h-K8e2s5sfR9crDQsEzFYciWjipxVZfBtG6A2h9DsbTgaSsyJmInEzImYuRCLFvHHUjad7RrvumCb3X_Gh7OxAYDfHiXiX1Lwb4smeXo
CODEN ITCCF6
CitedBy_id crossref_primary_10_1016_j_future_2023_10_023
crossref_primary_10_1155_2021_5895809
crossref_primary_10_1109_TIFS_2023_3286712
crossref_primary_10_1109_TDSC_2021_3138445
crossref_primary_10_3390_sym15020299
crossref_primary_10_21015_vtcs_v11i1_1521
crossref_primary_10_1016_j_csi_2023_103819
crossref_primary_10_1109_TSC_2019_2937764
crossref_primary_10_1016_j_comnet_2024_110641
crossref_primary_10_1109_ACCESS_2021_3113649
crossref_primary_10_9728_dcs_2024_25_7_1919
crossref_primary_10_1016_j_asej_2021_05_018
crossref_primary_10_1109_JIOT_2019_2948622
crossref_primary_10_1109_ACCESS_2021_3103725
crossref_primary_10_1109_TCC_2020_3008795
crossref_primary_10_1109_TSC_2023_3250705
crossref_primary_10_1109_TWC_2020_2975781
crossref_primary_10_1016_j_vehcom_2019_03_003
crossref_primary_10_1515_comp_2020_0167
crossref_primary_10_1109_JIOT_2021_3050562
crossref_primary_10_3390_en16073208
crossref_primary_10_1109_TDSC_2024_3359240
crossref_primary_10_1155_2019_2423915
crossref_primary_10_3390_s23094198
crossref_primary_10_1109_TIFS_2024_3356809
crossref_primary_10_1080_03772063_2021_1893842
Cites_doi 10.1007/3-540-45682-1_18
10.1109/CloudCom.2016.0054
10.1007/978-3-642-38348-9_1
10.1109/TIFS.2016.2587242
10.1109/TIFS.2014.2388156
10.1016/j.future.2017.02.017
10.1109/TIFS.2015.2447933
10.1007/3-540-46035-7_21
10.1186/s13638-018-1289-9
10.1007/978-3-642-32928-9_10
10.1109/JIOT.2016.2584538
10.1109/ACCESS.2018.2868920
10.1109/TDSC.2015.2399299
10.1007/978-3-642-01001-9_9
10.1007/978-3-642-54631-0_4
10.1007/978-3-642-14031-0_54
10.1109/MIC.2017.37
10.1007/978-3-642-25385-0_8
10.6028/NIST.SP.800-145
10.1016/j.future.2016.11.009
10.1090/conm/324/05731
10.1109/TC.2015.2419662
10.1109/TC.2015.2485225
10.1007/978-3-540-73489-5_4
10.1007/11426639_26
10.1109/TDSC.2018.2797190
10.1007/978-3-540-30539-2_18
10.1016/j.future.2017.01.024
10.1007/978-3-540-24676-3_13
10.1016/j.vehcom.2019.03.003
10.1007/11535218_16
10.1145/1180405.1180432
10.1109/TIT.2008.920224
10.1145/2342509.2342513
10.1007/978-3-319-11212-1_6
10.1007/978-3-662-49890-3_21
10.1007/BFb0053443
10.1007/978-3-319-21837-3_67
10.1016/j.future.2016.10.028
10.1109/TITS.2016.2579162
10.1007/978-3-642-01001-9_10
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TCC.2019.2903254
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE/IET Electronic Library
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2372-0018
EndPage 1128
ExternalDocumentID 10_1109_TCC_2019_2903254
8660476
Genre orig-research
GrantInformation_xml – fundername: National Key Research and Development Program of China
  grantid: 2017YFB0802000
  funderid: 10.13039/501100012166
– fundername: National Natural Science Foundation of China; NSF of China
  grantid: 61572198; 61321064
  funderid: 10.13039/501100001809
– fundername: Fundamental Research Funds for the Central Universities
  funderid: 10.13039/501100012226
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
HZ~
IEDLZ
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
PQQKQ
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c291t-c7f72b8779aee53e4ee604d5f2d8fd9ede0ced63d10a52e4fb5d6b880839a8363
IEDL.DBID RIE
ISSN 2168-7161
IngestDate Mon Jun 30 06:35:36 EDT 2025
Tue Jul 01 02:57:15 EDT 2025
Thu Apr 24 22:56:30 EDT 2025
Wed Aug 27 02:27:20 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c291t-c7f72b8779aee53e4ee604d5f2d8fd9ede0ced63d10a52e4fb5d6b880839a8363
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-8786-4562
PQID 2568777387
PQPubID 2040413
PageCount 12
ParticipantIDs crossref_primary_10_1109_TCC_2019_2903254
crossref_citationtrail_10_1109_TCC_2019_2903254
proquest_journals_2568777387
ieee_primary_8660476
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-07-01
PublicationDateYYYYMMDD 2021-07-01
PublicationDate_xml – month: 07
  year: 2021
  text: 2021-07-01
  day: 01
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE transactions on cloud computing
PublicationTitleAbbrev TCC
PublicationYear 2021
Publisher IEEE Computer Society
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE Computer Society
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref14
ref11
ref10
ref17
ref19
ref18
ref46
ref45
ref48
ref47
ref41
ref44
naor (ref37) 2000
ref49
ref7
ref9
ref3
ref6
ref40
turner (ref5) 0
ref35
(ref43) 0
ref34
ref36
ref31
ref33
meulen (ref4) 2015
ref32
ref2
ref1
ref39
ref38
dodis (ref21) 2002
nakamoto (ref16) 2009
fiat (ref8) 1993
boneh (ref30) 2002; 324
ref24
ref23
ref26
ref25
ref20
ref28
ref27
ref29
kim (ref22) 2015; 10
(ref42) 0
References_xml – ident: ref33
  doi: 10.1007/3-540-45682-1_18
– ident: ref27
  doi: 10.1109/CloudCom.2016.0054
– ident: ref31
  doi: 10.1007/978-3-642-38348-9_1
– ident: ref2
  doi: 10.1109/TIFS.2016.2587242
– volume: 10
  start-page: 679
  year: 2015
  ident: ref22
  article-title: Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2014.2388156
– ident: ref11
  doi: 10.1016/j.future.2017.02.017
– ident: ref41
  doi: 10.1109/TIFS.2015.2447933
– start-page: 480
  year: 1993
  ident: ref8
  article-title: Broadcast encryption
  publication-title: Proc Annu Int Cryptology Conf
– ident: ref34
  doi: 10.1007/3-540-46035-7_21
– year: 2009
  ident: ref16
  article-title: Bitcoin: A peer-to-peer electronic cash system
– ident: ref44
  doi: 10.1186/s13638-018-1289-9
– ident: ref38
  doi: 10.1007/978-3-642-32928-9_10
– ident: ref7
  doi: 10.1109/JIOT.2016.2584538
– ident: ref6
  doi: 10.1109/ACCESS.2018.2868920
– ident: ref13
  doi: 10.1109/TDSC.2015.2399299
– start-page: 61
  year: 2002
  ident: ref21
  article-title: Public key broadcast encryption for stateless receivers
  publication-title: Proc Secur Privacy Digit Rights Manage
– ident: ref39
  doi: 10.1007/978-3-642-01001-9_9
– ident: ref47
  doi: 10.1007/978-3-642-54631-0_4
– ident: ref40
  doi: 10.1007/978-3-642-14031-0_54
– ident: ref25
  doi: 10.1109/MIC.2017.37
– ident: ref14
  doi: 10.1007/978-3-642-25385-0_8
– year: 0
  ident: ref5
  publication-title: Reducing the Time to Value for Internet of Things Deployments
– ident: ref1
  doi: 10.6028/NIST.SP.800-145
– ident: ref26
  doi: 10.1016/j.future.2016.11.009
– volume: 324
  start-page: 71
  year: 2002
  ident: ref30
  article-title: Applications of multilinear forms to cryptography
  publication-title: Contemporary Math
  doi: 10.1090/conm/324/05731
– ident: ref15
  doi: 10.1109/TC.2015.2419662
– ident: ref9
  doi: 10.1109/TC.2015.2485225
– ident: ref20
  doi: 10.1007/978-3-540-73489-5_4
– start-page: 1
  year: 2000
  ident: ref37
  article-title: Efficient trace and revoke schemes
  publication-title: Proc Int Conf Financial Cryptography
– ident: ref49
  doi: 10.1007/11426639_26
– ident: ref3
  doi: 10.1109/TDSC.2018.2797190
– ident: ref35
  doi: 10.1007/978-3-540-30539-2_18
– ident: ref28
  doi: 10.1016/j.future.2017.01.024
– ident: ref45
  doi: 10.1007/978-3-540-24676-3_13
– ident: ref17
  doi: 10.1016/j.vehcom.2019.03.003
– ident: ref18
  doi: 10.1007/11535218_16
– year: 0
  ident: ref43
  article-title: Multiprecision integer and rational arithmetic
  publication-title: C++ library (miracl)
– year: 0
  ident: ref42
– ident: ref19
  doi: 10.1145/1180405.1180432
– ident: ref36
  doi: 10.1109/TIT.2008.920224
– ident: ref23
  doi: 10.1145/2342509.2342513
– ident: ref46
  doi: 10.1007/978-3-319-11212-1_6
– year: 2015
  ident: ref4
  article-title: Gartner says 6.4 billion connected "things" will be in use in 2016, up 30 percent from 2015
– ident: ref32
  doi: 10.1007/978-3-662-49890-3_21
– ident: ref12
  doi: 10.1007/BFb0053443
– ident: ref24
  doi: 10.1007/978-3-319-21837-3_67
– ident: ref29
  doi: 10.1016/j.future.2016.10.028
– ident: ref10
  doi: 10.1109/TITS.2016.2579162
– ident: ref48
  doi: 10.1007/978-3-642-01001-9_10
SSID ssj0000851919
Score 2.5304682
Snippet Fog computing is a promising extension of cloud computing, and enables computing directly at the edge of the network. Due to the decentralized and distributed...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1117
SubjectTerms access control
Algorithms
blockchain
broadcast encryption
Cloud computing
Collaboration
Edge computing
Encryption
Information security
Messages
Nodes
secure group communication
Security management
Vehicle dynamics
Title Key Management Scheme for Secure Channel Establishment in Fog Computing
URI https://ieeexplore.ieee.org/document/8660476
https://www.proquest.com/docview/2568777387
Volume 9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB50T15cn7i6Sg5eBNtt06ZNjrK4iqInhb2VpJmoKF3R3YP-epP0IT4Qb4Em7TCTdL6ZzAPg0KChqBkPUCtroHBkgchkGkhlbQ8UKUa5SxS-us7Ob9OLKZsuwXGXC4OIPvgMQzf0d_l6Vi6cq2zEsyxK82wZlq3hVudqdf4UBx1ELNqbyEiMbsZjF7olQiqihLL0i-bxrVR-_H-9Upn04aolp44leQwXcxWW798qNf6X3jVYbdAlOam3wzosYbUB_bZzA2kO8iacXeIb-Yx8sQ_u7YBYAEu8Ax6Jyzqo8ImcWvToHVV-3kNFJrM7Ur_QKr0tuJ2c3ozPg6alQlBSEc-DMjc5VTzPhURkCaaIlkTNDNXcaIEaoxJ1lug4koxiahTTmbJn3OIoyZMs2YZeNatwBwg1SmvDmY5lkoqYy8gkTCr7ASl4yekARi27i7KpN-7aXjwV3u6IRGEFVDgBFY2ABnDUrXiua238MXfT8bub17B6AMNWokVzGF8Li-pc1cOE57u_r9qDFepCVXwU7hB685cF7lusMVcHfpN9APFU0lE
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGGDhjShPDyxIpE2cOLFHVFHKo0xFYovs-AwIlCJoB_j12E5SxEOIzVLOiXXny30-3wPg0KChqBkPUCt7QOHIApHKJJDKnj1QJBhmLlF4cJ32b5KLW3Y7A8fTXBhE9MFn2HZDf5evR8XEuco6PE3DJEtnYd7afRZV2VpTj4oDDyISzV1kKDrDbtcFb4k2FWFMWfLF9vhmKj_-wN6s9JZh0CyoiiZ5bE_Gql28f6vV-N8Vr8BSjS_JSbUhVmEGyzVYbno3kFqV1-HsEt_IZ-yLfXBvB8RCWOJd8Ehc3kGJT-TU4kfvqvJ0DyXpje5I9UJr9jbgpnc67PaDuqlCUFARjYMiMxlVPMuERGQxJoh2iZoZqrnRAjWGBeo01lEoGcXEKKZTZbXcIinJ4zTehLlyVOIWEGqU1oYzHck4ERGXoYmZVPYDUvCC0xZ0GnbnRV1x3DW-eMr9ySMUuRVQ7gSU1wJqwdF0xnNVbeMP2nXH7yldzeoW7DYSzWt1fM0trnN1D2Oebf8-6wAW-sPBVX51fn25A4vUBa74mNxdmBu_THDPIo-x2vcb7gMUA9Wa
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Key+Management+Scheme+for+Secure+Channel+Establishment+in+Fog+Computing&rft.jtitle=IEEE+transactions+on+cloud+computing&rft.au=Zhang%2C+Lei&rft.date=2021-07-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2372-0018&rft.volume=9&rft.issue=3&rft.spage=1117&rft_id=info:doi/10.1109%2FTCC.2019.2903254&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-7161&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-7161&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-7161&client=summon