Research Area:  Fog Computing
Fog computing is deemed as a highly virtualized paradigm that can enable computing at the Internet of Things devices, residing in the edge of the network, for the purpose of delivering services and applications more efficiently and effectively. Since fog computing originates from and is a non-trivial extension of cloud computing, it inherits many security and privacy challenges of cloud computing, causing the extensive concerns in the research community. To enable authentic and confidential communications among a group of fog nodes, in this paper, we propose an efficient key exchange protocol based on ciphertext-policy attribute-based encryption (CP-ABE) to establish secure communications among the participants. To achieve confidentiality, authentication, verifiability, and access control, we combine CP-ABE and digital signature techniques. We analyze the efficiency of our protocol in terms of security and performance. We also implement our protocol and compare it with the certificate-based scheme to illustrate its feasibility.
Keywords:  
Author(s) Name:  Arwa Alrawais; Abdulrahman Alhothaily; Chunqiang Hu; Xiaoshuang Xing; Xiuzhen Cheng
Journal name:   IEEE Access
Conferrence name:  
Publisher name:  IEEE
DOI:  10.1109/ACCESS.2017.2705076
Volume Information:  ( Volume: 5) Page(s): 9131 - 9138
Paper Link:   https://ieeexplore.ieee.org/abstract/document/7932452