Loading

An Encrypted key Exchange Protocol to Secure Communication among Fog Nodes and the Cloud
G.Karuna1, Bijjam Goutami2, B.Rupa3

1G. Karuna*, CSE Department, GRIET, Hyderabad, India.
2Bijjam Goutami, CSE Department, GRIET, Hyderabad, India.
3B. Rupa, CSE Department, GRIET, Hyderabad, India.

Manuscript received on September 16, 2019. | Revised Manuscript received on 24 September, 2019. | Manuscript published on October 10, 2019. | PP: 5193-5197 | Volume-8 Issue-12, October 2019. | Retrieval Number: L27781081219/2019©BEIESP | DOI: 10.35940/ijitee.L2778.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Fog computing is considered as a significantly virtualized perspective that can enable preparing at the Internet of Things devices, living in the edge of the framework, to convey organizations and applications even more capably and feasibly. Since Fog preparing starts from and is a non-minor development of circulated registering, it gets various security and insurance troubles of dispersed processing, causing the expansive stresses in the examination gathering. To engage genuine and confidential exchanges among a social occasion of fog centre points, proposes a capable key exchange show in perspective on figure content approach characteristic based encryption to develop secure correspondences among the individuals. To achieve confidentiality, approval, capriciousness, and access control, to join CP-ABE and mechanized mark techniques. The proposed method explores the efficiency to show similar to security and execution.
Keywords: Cloud Computing, Communications Security, Fog Computing, Security, Cipher Text Policy Attribute based Encryption
Scope of the Article: Cloud Computing