Volume 13, Number 3

Trust Level Evaluation based Asymmetric Cryptography Protocol
for Flexible Access Control in Fog Computing

  Authors

C. Nagarani1 and R. Kousalya2, 1PSG College of Arts and Science, India, 2Dr. N.G.P Arts and Science College, India

  Abstract

The foremost problems in the fog-enabled cloud computing model are security guarantees and data Access Control (AC) because of the imitation of data by invaders. To enhance the security of this system, an Extended Communication Latency-based Authentication Scheme (ECLAS) that solves the mobility and similar locality legitimate login failures via applying two-factor authentication and a keystroke dynamics computation with obfuscated Round Trip Latency (RTL) of each users. But, the data need to accessed by other user should fulfill an be expected authentication and defend against dishonest access or login. So, data AC at cloud or fog nodes is greatly essential in many applications of fog-enabled cloud systems. Therefore in this article, a Flexible AC (FAC) protocol is introduced with the ECLAS for controlling the data access in fog-enabled cloud systems according to the trust estimated by the user in the cloud and reputations created by the amount of fog nodes in a flexible way via applying the Elliptic Curve Cryptography (ECC) and Proxy Re-Encryption (PRE). In this scheme, multi-dimensional controls are proposed on cloud and fog data access according to the strategies set by the user. The user encrypts its information with asymmetric secret key and this key is split into many segments for supporting different control policies. So, the user encrypts various segments of secret key with different encryption keys which are accordingly handled by the user and an amount of fog nodes regarding various reputation characteristics in different scenarios. Then, the user or fog nodes manage the data access using data encryption by the user. Finally, the experimental results exhibit the effectiveness of the proposed FAC as compared to the state-of-the-art AC schemes.

  Keywords

Fog computing, Cloud computing, Extended CLAS, Access Control, Trust, Reputation, Elliptic curve encryption.