2019
DOI: 10.1016/j.adhoc.2019.101937
|View full text |Cite
|
Sign up to set email alerts
|

Preserving data security in distributed fog computing

Abstract: In this paper, a novel cryptographic solution is proposed to secure data in fog computing. The solution combines the AES-GMAC operation mode with information dispersal over GF(2 w) to provide data confidentiality, integrity, and availability along with source authentication. The value of w is flexible (8, 16, 32 or 64) and it could be configured according to the fog device features. Moreover, the proposed cryptographic solution is based on the dynamic key-dependent approach, which allows for a good compromise … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 45 publications
(16 citation statements)
references
References 31 publications
0
16
0
Order By: Relevance
“…This can be attained by using the one round cipher approach, where cipher requires only one round and with a minimum number of operations [359][360][361][362][363]. We think that modern cryptographic algorithms should use the dynamic cryptographic primitives approach to reach a good balance between security and performance level [364]. New research work should be presented towards reaching the best balance between performance, security and real implementations [365].…”
Section: Future Research Directionsmentioning
confidence: 99%
“…This can be attained by using the one round cipher approach, where cipher requires only one round and with a minimum number of operations [359][360][361][362][363]. We think that modern cryptographic algorithms should use the dynamic cryptographic primitives approach to reach a good balance between security and performance level [364]. New research work should be presented towards reaching the best balance between performance, security and real implementations [365].…”
Section: Future Research Directionsmentioning
confidence: 99%
“…The attackers would try to recover the secret key given that the static ciphers use fixed cryptographic primitives [14]. Thus, dynamic lightweight cipher schemes are required to strike the balance between security and performance [15], [16], [17], [18], [19], [20].…”
Section: A Lightweight Key-dependent Ciphermentioning
confidence: 99%
“…• Availability: Exchanged information should be processed and made available [88,89,90]. These kinds of attacks are very dangerous for real-time applications since a small delay can make the message useless.…”
Section: Its Security Requirementsmentioning
confidence: 99%