Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems

There are a number of benefits associated with the deployment of fog computing, for example, by analyzing and computing data from Internet-of-Things (IoT) devices at the fog nodes reduce the bandwidth, computational, and storage overheads at the cloud servers and improve user quality of experience (e.g., due to reduced latency). However, there are also additional security implications and requirements. For example, secure keys are needed to establish secure channels among these distributed fog nodes. Therefore, to facilitate fog nodes in managing secure keys and establishing secure group channels, we present a novel fog system and propose a blockchain-based group key management scheme that builds on an earlier work. We also design a new resource authentication mechanism based on Proof of Work (PoW), and when deployed in our fog system facilitates resource authentication (i.e., a fog node in a fog system can evaluate the capability of a fog device’s computing power before the device is permitted to enter the system). Findings from our simulations and secure analysis demonstrate the utility of our system.

[1]  Lei Zhang,et al.  Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing , 2022, IEEE Transactions on Cloud Computing.

[2]  Kim-Kwang Raymond Choo,et al.  Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities , 2022, IEEE Transactions on Services Computing.

[3]  Ning Zhang,et al.  LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue , 2020, IEEE Transactions on Dependable and Secure Computing.

[4]  Lei Zhang,et al.  Key Management Scheme for Secure Channel Establishment in Fog Computing , 2021, IEEE Transactions on Cloud Computing.

[5]  Yuanfei Zhang,et al.  Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud , 2020, IEEE Transactions on Dependable and Secure Computing.

[6]  Lei Zhang,et al.  Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home , 2020, IEEE Internet of Things Journal.

[7]  Tongtong Li,et al.  Bitcoin and Blockchain: Security and Privacy , 2019, IEEE Internet of Things Journal.

[8]  Qi Zhang,et al.  Sidechain technologies in blockchain networks: An examination and state-of-the-art review , 2020, J. Netw. Comput. Appl..

[9]  Hao Zhang,et al.  Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing , 2019, Future Gener. Comput. Syst..

[10]  Lei Zhang,et al.  Blockchain based secure data sharing system for Internet of vehicles: A position paper , 2019, Veh. Commun..

[11]  Yue Zhang,et al.  APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT , 2019, J. Netw. Comput. Appl..

[12]  Mohamed Amine Ferrag,et al.  Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.

[13]  Jules Pagna Disso,et al.  An Analysis into the Scalability of Bitcoin and Ethereum , 2018, Advances in Intelligent Systems and Computing.

[14]  Mohammad S. Obaidat,et al.  A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs , 2017, Future Gener. Comput. Syst..

[15]  Karen A. Scarfone,et al.  Blockchain Technology Overview , 2018, ArXiv.

[16]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[17]  Min Chen,et al.  Towards collusion-attack-resilient group key management using one-way function tree , 2016, Comput. Networks.

[18]  Shaoquan Jiang,et al.  Group Key Agreement with Local Connectivity , 2016, IEEE Transactions on Dependable and Secure Computing.

[19]  Bülent Tavli,et al.  Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies , 2016, Ad Hoc Networks.

[20]  Josep Domingo-Ferrer,et al.  Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts , 2016, IEEE Transactions on Computers.

[21]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[22]  Craig Gentry,et al.  Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.

[23]  Ilka Philippow,et al.  A Survey on Usage Scenarios for Requirements Traceability in Practice , 2013, REFSQ.

[24]  Shigeo Mitsunari A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor , 2013, IACR Cryptol. ePrint Arch..

[25]  David Pointcheval,et al.  Decentralized Dynamic Broadcast Encryption , 2012, SCN.

[26]  Renaud Dubois,et al.  Improved Broadcast Encryption Scheme with Constant-Size Ciphertext , 2012, Pairing.

[27]  Josep Domingo-Ferrer,et al.  Bridging Broadcast Encryption and Group Key Agreement , 2011, ASIACRYPT.

[28]  Siaw-Lynn Ng,et al.  Threshold Anonymous Announcement in VANETs , 2011, IEEE Journal on Selected Areas in Communications.

[29]  Moni Naor,et al.  Efficient trace and revoke schemes , 2000, International Journal of Information Security.

[30]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[31]  Qi Ying Study on Collective Ball behind Wooden Bucket Principle , 2009 .

[32]  Jason Smith,et al.  A User-Centric Protocol for Conditional Anonymity Revocation , 2008, TrustBus.

[33]  Yevgeniy Dodis,et al.  A Verifiable Random Function with Short Proofs and Keys , 2005, Public Key Cryptography.

[34]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[35]  Dan Boneh,et al.  Applications of Multilinear Forms to Cryptography , 2002, IACR Cryptol. ePrint Arch..