Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme

被引:23
|
作者
Shruti [1 ,2 ]
Rani, Shalli [2 ]
Srivastava, Gautam [3 ,4 ,5 ]
机构
[1] Goswami Ganesh Dutta Sanatan Dharma Coll, Chandigarh, India
[2] Chitkara Univ, Chitkara Univ Inst Engn & Technol, Rajpura, Punjab, India
[3] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut 1102, Lebanon
[4] China Med Univ, Res Ctr Interneural Comp, Taichung 40402, Taiwan
[5] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
关键词
Industry; 5.0; Smart industry; Fog computing; Internet of things (IoT); Sensors; Smart energy supply system; SMART CITIES; IOT DATA; EDGE;
D O I
10.1016/j.eswa.2023.121180
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Industry 5.0 is an emerging phase in the industrial field where humans and the latest technologies work together to bring revolutionary changes to work processes. It is the future of the upcoming generation for smart city development. Operations and designing of smart systems for Industrial Internet of Things (IIoT) devices include various types of decision-making at different levels of domains. Highly complex systems have a huge number of variables and decision-making requirements which also needs real-time data gathering from IIoT devices. Fog computing performs a key role by locating IIoT devices close to its proximity and reducing the processing time in comparison to cloud computing for smart systems. It makes smart systems work in a secure, flexible and time-sensitive manner. The presence of sensors makes data-intensive analysis challenging in these systems but fog computing handles it all. Along with other challenges, security is also one of the concerns that can affect the overall system if compromised. The main objective of this article is to introduce hierarchical fog computing-based architecture for smart energy-supplying systems as a part of Industry 5.0. This architecture will be able to support a large number of infrastructural components and provide services efficiently. In this article, validation of the amount of data transmitted by IIoT devices to the cloud per second is done for three different cases: 1. The proposed four-layer fog computing architecture, 2. Fog architecture with only layer three layers with the rest of the computing on the cloud, 3. A traditional system with cloud computing. The proposed approach is validated over state of art approaches in terms of accuracy. Moreover, the security of the architecture is provided using the Attribute-based encryption (ABE) scheme, which ensures data confidentiality with minimum overhead.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION
    Manjutha, M.
    Kumar, Arun K.
    Sri, Subha, V
    Dharshana, Shree D.
    INTERNATIONAL JOURNAL OF LIFE SCIENCE AND PHARMA RESEARCH, 2022, 12 : 81 - 92
  • [42] A secure billing protocol over attribute-based encryption in vehicular cloud computing
    Lewis Nkenyereye
    Youngho Park
    Kyung Hyune Rhee
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [43] Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing
    Yan, Hongyang
    Li, Xuan
    Du, Jiali
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 329 - 332
  • [44] Forward-secure ciphertext-policy attribute-based encryption scheme
    State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Information Engineering University, Zhengzhou
    450001, China
    Wei, Jiang-Hong, 1600, Editorial Board of Journal on Communications (35):
  • [45] Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation
    Wu Qiuxin
    Zhang Miao
    CHINA COMMUNICATIONS, 2012, 9 (09) : 22 - 40
  • [46] An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors
    Ruizhong Du
    Ailun Tan
    Junfeng Tian
    Tsinghua Science and Technology, 2020, 25 (05) : 579 - 588
  • [47] An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors
    Du, Ruizhong
    Tan, Ailun
    Tian, Junfeng
    TSINGHUA SCIENCE AND TECHNOLOGY, 2020, 25 (05) : 579 - 588
  • [48] Survey on attribute-based encryption in cloud computing
    Ancy, P.R.
    Krishna, Addapalli V.N.
    Balachandran, K.
    Balamurugan, M.
    Prakasi, O.S. Gnana
    Ancy, P.R. (ancy.prasadam@res.christuniversity.in), 1600, Femto Technique Co., Ltd. (22): : 863 - 868
  • [49] Attribute-based Encryption in Cloud Computing Environment
    Yan, Yuping
    Kamel, Mohammed B. M.
    Ligeti, Peter
    2020 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE, 2020, : 63 - 68
  • [50] SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing
    Saidi, Ahmed
    Nouali, Omar
    Amira, Abdelouahab
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 167 - 185