Secure and privacy-preserving D2D communication in fog computing services

被引:11
|
作者
Ogundoyin, Sunday Oyinlola [1 ]
Kamil, Ismaila Adeniyi [1 ]
机构
[1] Univ Ibadan, Dept Elect & Elect Engn, Secur Privacy Commun SPCOM Res Grp, Ibadan, Nigeria
关键词
Fog-to-fog; Fog colony; Authentication; Fog computing; Multi-colony; Fog collaboration; CERTIFICATELESS SIGNCRYPTION SCHEME; USER AUTHENTICATION SCHEME; SMART HEALTH; EFFICIENT; PROTOCOL; INTERNET; ENERGY; SYSTEM;
D O I
10.1016/j.comnet.2022.108942
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D)-aided fog network has proven to be a viable means to improve the performance of fog computing technology. To exploit the full potentials of the D2D-supported fog computing architecture, it is imperative to protect the information transmitted among collaborating fog nodes against unauthorized access as failure to do so may have catastrophic consequences. However, this critical issue has not been investigated in most of the existing works. Therefore, this paper proposes a secure and privacy-aware trust based communication strategy for fog-to-fog collaborative services. An elliptic curve cryptography (ECC)-based two-party authentication and key agreement protocol is designed to allow two collaborating fog nodes generate a unique shared secret session key. A multi-colony head selection strategy is proposed using a multi-criteria decision-making method (MCDM), where multiple fog nodes are selected as colony head. A new efficient group key distribution and updating mechanism is designed for ensuring secured group communication. Consequently, ECC-based message dissemination approaches are designed for intra-and inter-colony trustworthy communications, where the generated secret session and group keys are used for data encryption. Moreover, we demonstrate that the proposed scheme guarantees data confidentiality and unforgeability against both Type I and Type II adversaries in the random oracle model (ROM) based on the intractability of the Computational Diffie-Hellman Problem (CDHP) and Discrete Logarithm Problem (DLP), respectively. An extensive performance analysis shows that the proposed scheme is very efficient and suitable for practical deployment. Comparative analysis reveals that the proposed scheme reports an improvement of about 33.15%-93.88%, 18.87%-67.91% , and 38.5%-93.8% in computation cost, communication overhead, and energy consumption, respectively, over the state-of-the-art related schemes.
引用
收藏
页数:20
相关论文
共 50 条
  • [11] Fog Computing and D2D Networks Integration
    Hamadani, Mustafa Khaleel
    Borcoci, Eugen
    2021 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE BLACKSEACOM), 2021, : 59 - 64
  • [12] Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing
    Li, Yiran
    Li, Hongwei
    Xu, Guowen
    Xiang, Tao
    Huang, Xiaoming
    Lu, Rongxing
    Li, Hongwei, 1600, Institute of Electrical and Electronics Engineers Inc. (07): : 11460 - 11472
  • [13] Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing
    Li, Yiran
    Li, Hongwei
    Xu, Guowen
    Xiang, Tao
    Huang, Xiaoming
    Lu, Rongxing
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12): : 11460 - 11472
  • [14] Advanced Privacy-Preserving Framework for Enhancing Fog Computing to Secure IoT Data Stream
    Ranjan, Aditya Kaushal
    Kumar, Prabhat
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (02) : 380 - 388
  • [15] Security-Aware and Privacy-Preserving D2D Communications in 5G
    Zhang, Aiqing
    Lin, Xiaodong
    IEEE NETWORK, 2017, 31 (04): : 70 - 77
  • [16] D2D Big Data Privacy-Preserving Framework Based on (a, k)-Anonymity Model
    Wang, Jie
    Li, Hongtao
    Guo, Feng
    Zhang, Wenyin
    Cui, Yifeng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2019, 2019
  • [17] Secure and Privacy-Preserving Database Services in the Cloud
    Agrawal, Divyakant
    El Abbadi, Amr
    Wang, Shiyuan
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2013, : 1268 - 1271
  • [18] Allowing privacy-preserving fog computing with digital identity assurance in remote clinical services
    Buccafurri, Francesco
    Lax, Gianluca
    Russo, Antonia
    ELECTRONIC GOVERNMENT- AN INTERNATIONAL JOURNAL, 2023, 19 (02) : 185 - 201
  • [19] Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet
    Sun, Yunqing
    Cao, Jin
    Ma, Maode
    Li, Hui
    Niu, Ben
    Li, Fenghua
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 425 - 431
  • [20] Secure and privacy-preserving pattern matching in outsourced computing
    Li, Dongmei
    Dong, Xiaolei
    Cao, Zhenfu
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3444 - 3451