Abstract

Fog Computing is a region of Computer Science that is under steady construction and development, and related to data security, the worldview turns out to be more solid and secure for IoT's edge stages. The verification of limited memory devices has serious issues since memory utilization is high when applied with different models that have the motivation behind shared confirmation. In this paper, we propose the Novel cipher text-based encryption model (NCEM) which has an information access control plot dependent on Ciphertext-Policy it give information privacy, fine-grained control, and mysterious validation in a multi-authority fog computing framework. The sign cryption and plan cryption overhead for the client is altogether diminished by redistributing the bothersome calculation tasks to fog hubs. The proposed conspire is demonstrated to be secure in the standard model and can give trait repudiation and public unquestionable status. The security analysis, asymptotic multifaceted nature examination, and implementation results demonstrate that our construction can offset the security objectives with useful effectiveness in calculation.

Highlights

  • Turkish Journal of Computer and Mathematics EducationShaik Jaffer Vali a, Dr Jitendra Sheetlani b a Research Scholar, Dept. of Computer Science, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Bhopal Indore Road, Madhya Pradesh, India b Research Guide, Dept. of Computer Science, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Bhopal Indore Road, Madhya Pradesh, India

  • The Internet of Things is an assortment of embedded sensors, software, and actuators present in devices imparting over the Internet to yield Intelligence, by collecting, processing and trading the produced data

  • The work of Cloud Computing administrations has significantly helped the processing and storage of this Big data produced by Internet of Things (IoT) devices

Read more

Summary

Turkish Journal of Computer and Mathematics Education

Shaik Jaffer Vali a, Dr Jitendra Sheetlani b a Research Scholar, Dept. of Computer Science, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Bhopal Indore Road, Madhya Pradesh, India b Research Guide, Dept. of Computer Science, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Bhopal Indore Road, Madhya Pradesh, India. Shaik Jaffer Vali a, Dr Jitendra Sheetlani b a Research Scholar, Dept. Of Computer Science, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Bhopal Indore Road, Madhya Pradesh, India b Research Guide, Dept. Of Computer Science, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Bhopal Indore Road, Madhya Pradesh, India. Article History: Received: 11 January 2021; Accepted: 27 February 2021; Published online: 5 April 2021

Introduction
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call