WebApr 29, 2024 · In this paper, we provide a new system in fog computing, the ciphertext-policy attribute-based encryption with dynamic keyword search (ABDKS). WebIoT devices in a distributed environment that work on shared data still have a necessity for a locking mechanism to safely take turns while updating shared data. However, we no longer have the notion of mutexes when working in a distributed system.
Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog …
WebIn this direction, vehicular fog computing (VFC) has emerged which extends the concept of fog computing to conventional vehicular networks. It is a geographically distributed paradigm that has the potential to conduct time-critical and data-intensive tasks by pushing intelligence (i.e. computing resources, storage, and application services) in ... WebUnfortunately, most of them are impractical when directly applied to cloud-fog IoT computing, mainly due to the large number of resource-constrained end-devices (EDs). In this paper, we present a secure cloud-fog IoT data sharing system with bilateral access control based on a new cryptographic tool called lightweight matchmaking encryption. is it okay for dogs to eat peas
A Lightweight Attribute-Based Security Scheme for Fog-Enabled ... - Hindawi
WebDec 14, 2024 · In this paper, a Lightweight Anonymous Mutual Authentication Scheme (LAMAS) for securing fog computing is proposed based on elliptic curve cryptography. … WebJul 4, 2024 · We have proposed a HIBAF architecture for fog computing based on encryption and decryption methods with small key sizes. Our proposed scheme is comparatively more lightweight key management procedure than the existing ones. The primary objectives of our work are as follows: WebSep 1, 2024 · FogHA is consistent with the low latency characteristics of fog computing. During the handover authentication process, no cloud server is involved, and only fog nodes execute collaborative authentication. In addition, the handover authentication protocol only uses lightweight cryptographic primitives, so it has high handover efficiency. • keter high store plus box