Abstract

Fog computing is decentralized computing infrastructure which used to present various services. Generally, fog network includes numerous data, computation, storage and application processes among data in the server. The fog node toward large-scale end-users offers a variety of interacted IoT services. Security is main concern for preserving data from unauthorized user access as carry outing secure data storage from fog user as well as server. Thus, secure data storage in fog is a demanding and rising concern for Fog-IoT security paradigms. Several research works have developed for secured fog data storage. But, data security level was minimum because performance of signcryption was not effectual. To overcome such problems, Torus Ring Signcrypted Kademlia Hash Storage (TRSKHS) method is proposed in fog computing. The designed TRSKHS method contains key generation, encryption as well as decryption for enhancing fog data storage by lesser computational cost. At first, registration process is carried to register fog users detail to the fog server. After registering, fog server generates pair of keys namely public key and public key for every registered user using Torus Ring Signcryption. Then, the fog user carry outs encryption as well as signature generation process. Initially, fog user data is encrypted in ciphertext as well as signature is generated for each data to provide secured data storage. Before storing encrypted data in server, hash value of each data is generated by using Kademlia Hash function. Then, encrypted user data through their hash value is stored in database. Finally, the decryption and signature verification is performed by the user to decrypt data. After that authorized users attain original data and enhance secure data storage. Through data accessing process, fog data is decrypted by their generated private key. This assists for TRSKHS method to enhance secure data storage by lesser amount of encryption time. Experimental assessment of TRSKHS method and conventional methods are performed with number of fog users as well as data. Proposed TRSKHS method carries the experimental evaluation using encryption time, storage complexity, data confidentiality rate as well as data integrity rate.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call