Security in Fog Computing through Encryption

Cloud computing is considered as one of the most exciting technology because of its flexibility and scalability. The main problem that occurs in cloud is security. To overcome the problems or issues of security, a new technique called fog-computing is evolved. As there are security issues in fog even after getting the encrypted data from cloud, we implemented the process of encryption using AES algorithm to check how it works for the fog. So far, to our analysis AES algorithm is the most secured process of encryption for security. Three datasets of different types are considered and applied the analysed encryption technique over those datasets. On validation, entire data over datasets is being accurately encrypted and decrypted back as well. We took android mobile as an edge device and deployed the encryption over datasets into it. Further, performance of encryption is evaluated over selected datasets for accuracy if the entire data is correctly encrypted and decrypted along with the time, User load, Response time, Memory Utilization over file size. Further best and worst cases among the datasets are analysed thereby evaluating the suitability of AES in fog.

[1]  Sonali Khairnar,et al.  FOG COMPUTING: A NEW CONCEPT TO MINIMIZE THE ATTACKS AND TO PROVIDE SECURITY IN CLOUD COMPUTING ENVIRONMENT , 2014 .

[2]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[3]  Malek Ben Salem,et al.  Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[4]  Gurpreet Singh,et al.  A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security , 2013, International Journal of Computer Applications.

[5]  Siani Pearson,et al.  Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[6]  Xi He,et al.  Cloud Computing: a Perspective Study , 2010, New Generation Computing.

[7]  .S Karthik Data Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System , 2014 .

[8]  Mohammad Shahidul Islam,et al.  International Journal of Scientific Engineering and Research (IJSER) , 2013 .

[9]  Sugata Sanyal,et al.  Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques , 2012, ArXiv.

[10]  Rishabh Jain,et al.  AES Algorithm Using 512 Bit Key Implementationfor Secure Communication , 2014 .

[11]  Kundankumar Rameshwar Saraf,et al.  Text and Image Encryption Decryption Using Advanced Encryption Standard , 2014 .

[12]  A. C. Nuthan,et al.  Implementation of advanced encryption Standard-192 bit using multiple keys , 2013 .