Visible to the public Minimizing Data Breach by a Malicious Fog Node within a Fog Federation

TitleMinimizing Data Breach by a Malicious Fog Node within a Fog Federation
Publication TypeConference Paper
Year of Publication2020
AuthorsAlshehri, Mohammed, Panda, Brajendra
Conference Name2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
Keywordsattribute-based encryption, Data security, fine-grained access control, Fog Computing, Fog Computing and Security, pubcrawl, Resiliency, Rogue Node, Scalability, security
AbstractFog computing was emerged as mini-clouds deployed close to the ground to reduce communication overhead and time latency between the cloud and end-users' devices. Because fog computing is an extension of cloud computing, it inherits the security and privacy issues cloud computing has faced. If a Fog Node (FN) serving end-devices goes rogue or becomes maliciously compromised, this would hinder individuals' and organizations' data security (e.g., Confidentiality, Integrity, and Availability). This paper presents a novel scheme based on the Ciphertext-Policy-Attribute-Based-Encryption (CP-ABE) and hashing cryptographic primitives to minimize the amount of data in danger of breach by rogue fog nodes with maintaining the fog computing services provided to end-users' devices. This scheme manages to oust rogue Fog Nodes (FNs) and to prevent them from violating end-users' data security while guarantying the features provided by the fog computing paradigm. We demonstrate our scheme's applicability and efficiency by carrying out performance analysis and analyzing its security, and communication overhead.
DOI10.1109/CSCloud-EdgeCom49738.2020.00016
Citation Keyalshehri_minimizing_2020