Secure and privacy-preserving D2D communication in fog computing services

被引:11
作者
Ogundoyin, Sunday Oyinlola [1 ]
Kamil, Ismaila Adeniyi [1 ]
机构
[1] Univ Ibadan, Dept Elect & Elect Engn, Secur Privacy Commun SPCOM Res Grp, Ibadan, Nigeria
关键词
Fog-to-fog; Fog colony; Authentication; Fog computing; Multi-colony; Fog collaboration; CERTIFICATELESS SIGNCRYPTION SCHEME; USER AUTHENTICATION SCHEME; SMART HEALTH; EFFICIENT; PROTOCOL; INTERNET; ENERGY; SYSTEM;
D O I
10.1016/j.comnet.2022.108942
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D)-aided fog network has proven to be a viable means to improve the performance of fog computing technology. To exploit the full potentials of the D2D-supported fog computing architecture, it is imperative to protect the information transmitted among collaborating fog nodes against unauthorized access as failure to do so may have catastrophic consequences. However, this critical issue has not been investigated in most of the existing works. Therefore, this paper proposes a secure and privacy-aware trust based communication strategy for fog-to-fog collaborative services. An elliptic curve cryptography (ECC)-based two-party authentication and key agreement protocol is designed to allow two collaborating fog nodes generate a unique shared secret session key. A multi-colony head selection strategy is proposed using a multi-criteria decision-making method (MCDM), where multiple fog nodes are selected as colony head. A new efficient group key distribution and updating mechanism is designed for ensuring secured group communication. Consequently, ECC-based message dissemination approaches are designed for intra-and inter-colony trustworthy communications, where the generated secret session and group keys are used for data encryption. Moreover, we demonstrate that the proposed scheme guarantees data confidentiality and unforgeability against both Type I and Type II adversaries in the random oracle model (ROM) based on the intractability of the Computational Diffie-Hellman Problem (CDHP) and Discrete Logarithm Problem (DLP), respectively. An extensive performance analysis shows that the proposed scheme is very efficient and suitable for practical deployment. Comparative analysis reveals that the proposed scheme reports an improvement of about 33.15%-93.88%, 18.87%-67.91% , and 38.5%-93.8% in computation cost, communication overhead, and energy consumption, respectively, over the state-of-the-art related schemes.
引用
收藏
页数:20
相关论文
共 50 条
  • [11] Multi-Access Filtering for Privacy-Preserving Fog Computing
    Gai, Keke
    Zhu, Liehuang
    Qiu, Meikang
    Xu, Kai
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 539 - 552
  • [12] A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing
    Wei, Zhijun
    Li, Jing
    Wang, Xianmin
    Gao, Chong-Zhi
    [J]. IEEE ACCESS, 2019, 7 : 62785 - 62793
  • [13] A Secure Privacy-Preserving Mutual Authentication Scheme for Publish-Subscribe Fog Computing
    Salem, Fatty M.
    [J]. 2018 14TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2018, : 213 - 218
  • [14] Fog Computing and D2D Networks Integration
    Hamadani, Mustafa Khaleel
    Borcoci, Eugen
    [J]. 2021 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE BLACKSEACOM), 2021, : 59 - 64
  • [15] Advanced Privacy-Preserving Framework for Enhancing Fog Computing to Secure IoT Data Stream
    Ranjan, Aditya Kaushal
    Kumar, Prabhat
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (02) : 380 - 388
  • [16] Privacy-Preserving Storage in the Fog
    Fabsich, Michael
    Kaaser, Dominik
    Karagiannis, Vasileios
    Schulte, Stefan
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2022), 2022, : 138 - 149
  • [17] SDN based communications privacy-preserving architecture for VANETs using fog computing
    Arif, Muhammad
    Wang, Guojun
    Balas, Valentina Emilia
    Geman, Oana
    Castiglione, Aniello
    Chen, Jianer
    [J]. VEHICULAR COMMUNICATIONS, 2020, 26
  • [18] Secure and Lightweight Conditional Privacy-Preserving Authentication for Fog-Based Vehicular Ad Hoc Networks
    Zhong, Hong
    Chen, Lei
    Cui, Jie
    Zhang, Jing
    Bolodurina, Irina
    Liu, Lu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11): : 8485 - 8497
  • [19] A privacy-preserving data aggregation scheme for dynamic groups in fog computing
    Shen, Xiaodong
    Zhu, Liehuang
    Xu, Chang
    Sharif, Kashif
    Lu, Rongxing
    [J]. INFORMATION SCIENCES, 2020, 514 (514) : 118 - 130
  • [20] Blockchain-assisted D2D Data Sharing in Fog Computing
    Peng, Yi
    Cui, Taiping
    Shen, Bin
    Lin, Feng
    Huang, Xiaoge
    Chen, Qianbin
    [J]. 2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,