Secure and privacy-preserving D2D communication in fog computing services

被引:11
|
作者
Ogundoyin, Sunday Oyinlola [1 ]
Kamil, Ismaila Adeniyi [1 ]
机构
[1] Univ Ibadan, Dept Elect & Elect Engn, Secur Privacy Commun SPCOM Res Grp, Ibadan, Nigeria
关键词
Fog-to-fog; Fog colony; Authentication; Fog computing; Multi-colony; Fog collaboration; CERTIFICATELESS SIGNCRYPTION SCHEME; USER AUTHENTICATION SCHEME; SMART HEALTH; EFFICIENT; PROTOCOL; INTERNET; ENERGY; SYSTEM;
D O I
10.1016/j.comnet.2022.108942
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D)-aided fog network has proven to be a viable means to improve the performance of fog computing technology. To exploit the full potentials of the D2D-supported fog computing architecture, it is imperative to protect the information transmitted among collaborating fog nodes against unauthorized access as failure to do so may have catastrophic consequences. However, this critical issue has not been investigated in most of the existing works. Therefore, this paper proposes a secure and privacy-aware trust based communication strategy for fog-to-fog collaborative services. An elliptic curve cryptography (ECC)-based two-party authentication and key agreement protocol is designed to allow two collaborating fog nodes generate a unique shared secret session key. A multi-colony head selection strategy is proposed using a multi-criteria decision-making method (MCDM), where multiple fog nodes are selected as colony head. A new efficient group key distribution and updating mechanism is designed for ensuring secured group communication. Consequently, ECC-based message dissemination approaches are designed for intra-and inter-colony trustworthy communications, where the generated secret session and group keys are used for data encryption. Moreover, we demonstrate that the proposed scheme guarantees data confidentiality and unforgeability against both Type I and Type II adversaries in the random oracle model (ROM) based on the intractability of the Computational Diffie-Hellman Problem (CDHP) and Discrete Logarithm Problem (DLP), respectively. An extensive performance analysis shows that the proposed scheme is very efficient and suitable for practical deployment. Comparative analysis reveals that the proposed scheme reports an improvement of about 33.15%-93.88%, 18.87%-67.91% , and 38.5%-93.8% in computation cost, communication overhead, and energy consumption, respectively, over the state-of-the-art related schemes.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] An Efficient and Fault-Tolerant Privacy-Preserving D2D Group Communication
    Chien, Hung-Yu
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (07): : 1517 - 1530
  • [2] Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing
    Zhang, Lei
    Li, Jiangtao
    IEEE ACCESS, 2018, 6 : 50384 - 50393
  • [3] Privacy-Preserving Vehicular Rogue Node Detection Scheme for Fog Computing
    Al-Otaibi, Basmah
    Al-Nabhan, Najla
    Tian, Yuan
    SENSORS, 2019, 19 (04)
  • [4] Secure and privacy-preserving orchestration and delivery of fog-enabled IoT services
    Viejo, Alexandre
    Sanchez, David
    AD HOC NETWORKS, 2019, 82 : 113 - 125
  • [5] Privacy-Preserving Federated Learning in Fog Computing
    Zhou, Chunyi
    Fu, Anmin
    Yu, Shui
    Yang, Wei
    Wang, Huaqun
    Zhang, Yuqing
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11): : 10782 - 10793
  • [6] Privacy-Preserving Fog Computing Paradigm
    Abubaker, Nabil
    Dervishi, Leonard
    Ayday, Erman
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 502 - 509
  • [7] Privacy-preserving public auditing for secure data storage in fog-to-cloud computing
    Tian, Hui
    Nan, Fulin
    Chang, Chin-Chen
    Huang, Yongfeng
    Lu, Jing
    Du, Yongqian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 127 : 59 - 69
  • [8] Reliable Customized Privacy-Preserving in Fog Computing
    Wang, Xiaodong
    Gu, Bruce
    Qu, Youyang
    Ren, Yongli
    Xiang, Yong
    Gao, Longxiang
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [9] Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs
    Xia, Zhuoqun
    Zeng, Lingxuan
    Gu, Ke
    Li, Xiong
    Jia, Weijia
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)
  • [10] PCP: A Privacy-Preserving Content-Based Publish-Subscribe Scheme With Differential Privacy in Fog Computing
    Wang, Qixu
    Chen, Dajiang
    Zhang, Ning
    Ding, Zhe
    Qin, Zhiguang
    IEEE ACCESS, 2017, 5 : 17962 - 17974