INFORMATION CHANGE THE WORLD

International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.8, No.5, May. 2016

Security in Fog Computing through Encryption

Full Text (PDF, 764KB), PP.28-36


Views:149   Downloads:17

Author(s)

Akhilesh Vishwanath, Ramya Peruri, Jing (Selena) He

Index Terms

Cloud Computing;Fog Computing;DES Algorithm;3DES Algorithm;AES Algorithm;Encryption

Abstract

Cloud computing is considered as one of the most exciting technology because of its flexibility and scalability. The main problem that occurs in cloud is security. To overcome the problems or issues of security, a new technique called fog-computing is evolved. As there are security issues in fog even after getting the encrypted data from cloud, we implemented the process of encryption using AES algorithm to check how it works for the fog. So far, to our analysis AES algorithm is the most secured process of encryption for security. Three datasets of different types are considered and applied the analysed encryption technique over those datasets. On validation, entire data over datasets is being accurately encrypted and decrypted back as well. We took android mobile as an edge device and deployed the encryption over datasets into it. Further, performance of encryption is evaluated over selected datasets for accuracy if the entire data is correctly encrypted and decrypted along with the time, User load, Response time, Memory Utilization over file size. Further best and worst cases among the datasets are analysed thereby evaluating the suitability of AES in fog.

Cite This Paper

Akhilesh Vishwanath, Ramya Peruri, Jing (Selena) He,"Security in Fog Computing through Encryption", International Journal of Information Technology and Computer Science(IJITCS), Vol.8, No.5, pp.28-36, 2016. DOI: 10.5815/ijitcs.2016.05.03

Reference

[1]Zhidong Shen, Li Li , Fei Yan, Xiaoping Wu , Cloud Computing System Based on Trusted Computing Platform, International Conference on Intelligent Computation Technology and Automation, Volume 1, May 2010, On page(s): 942-945. 

[2]Pearson, S., Benameur, A., Privacy, Security and Trust Issues Arises from Cloud Computing, Cloud Computing Technology and Science (CloudCom), IEEE Second International Conference 2010, On page(s): 693-702. 

[3]Rohit Bhadauria and Sugata Sanyal, A Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques. International Journal of Computer Applications, Volume 47- Number 18, June 2012, On page(s): 47-66. 

[4]Mohammed, E.M, Ambelkadar, H.S, Enhanced Data Security Model on Cloud Computing, 8 th International Conference on IEEE publication 2012, On page(s): cc-12- cc-17

[5]Lizhe Wang, Gregor von Laszewski, Marcel Kunze, Jie Tao, Cheng Fu, Xi He, Andrew Younge, Cloud Computing: A Perspective Study, New Generation ComputingAdvances of Distributed Information Processing, Volume 28, Issue 2, April 2010, On page(s): 137-146.

[6]Sonali Khairnar , Dhanashree Borkar, Fog Computing: A New Concept to Minimize the Attacks And TO PROVIDE SECURITY IN CLOUD COMPUTING ENVIRONMENT, IJRET: International Journal of Research in Engineering and Technology, Volume: 03 Issue: 06, Jun-2014.

[7]Ivan Stojmenovic SIT, Sheng Wen, The Fog Computing Paradigm: Scenarios and Security Issues , Federated Conference on Computer Science and Information Systems pp, ACSIS, Vol. 2, 2014.

[8]Neha Shrikant Dhande, FOG COMPUTING: REVIEW OF PRIVACY AND SECURITY ISSUES, International Journal of Engineering Research and General Science Volume 3, Issue 2, March-April, 2015

[9]Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis, “Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud” IEEE, 2014, DOI 10.1109/SPW.2012.19.

[10]Sowmya Nag K , H.B.Bhuvaneswari , Nuthan A.C, IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD-192 BIT USING MULTIPLE KEYS,  Research & Technology in the Coming Decades (CRT 2013), National Conference on Challenges in , vol., no., pp.1,7, 27-28 Sept. 2013

[11]Sumitra, “Comparative Analysis of AES and DES security Algorithms”, International Journal of Scientific and Research Publications (IJSRP), Volume 3, Issue 1, January 2013 Edition.

[12]Sombir Singh, Sunil K. Maakar, Dr.Sudesh Kumar, “Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 6, June 2013.

[13]Shah Kruti R., Bhavika Gambhava, “New Approach of Data Encryption Standard Algorithm”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012.

[14]Karthik .S, Muruganandam .A, “Data Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System”, International Journal of Scientific Engineering and Research (IJSER), Volume 2 Issue 11, November 2014.

[15]Majithia Sachin, Dinesh Kumar, “Implementation and Analysis of AES, DES and Triple DES on GSM Network”, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.1, January 2010.

[16]Gurpreet Singh and Supriya., “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security”, .International Journal of Computer Applications, 67(19):33-38, April 2013.

[17]Rishabh Jain, Rahul Jejurkar, Shrikrishna Chopade, Someshwar Vaidya, Mahesh Sanap, AES Algorithm Using 512 Bit Key Implementation for Secure Communication, International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization), Vol. 2, Issue 3, March 2014

[18]Kundankumar Rameshwar Saraf, Vishal Prakash Jagtap, Amit Kumar Mishra, Text and Image Encryption Decryption Using Advanced Encryption Standard, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 3, Issue 3, May – June 2014

[19]Advanced Encryption algorithm and its implementation. Accessed:July7,2015 https://en.wikipedia.org/wiki/Advanced_Encryption_Standard 

[20]Amazon-coco cola dataset with the company stocks. Accessed:July7,2015http://www2.stetson.edu/~jrasp/data.html 

[21]Hospital Charge Data, Federal Government Accessed: July 7, 2015. http://www.data.gov/health/

[22]Sample Data set-CrimeStat, National Institute of Justice website.Accessed:july7,2015. https://www.icpsr.umich.edu/CrimeStat/download.html