CFP last date
22 April 2024
Reseach Article

Security of Fog Storage by using Hybrid Cryptography

by Kartik Singh Prajapati, Uday Chourasia, Raju Baraskar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 18
Year of Publication: 2020
Authors: Kartik Singh Prajapati, Uday Chourasia, Raju Baraskar
10.5120/ijca2020920693

Kartik Singh Prajapati, Uday Chourasia, Raju Baraskar . Security of Fog Storage by using Hybrid Cryptography. International Journal of Computer Applications. 175, 18 ( Sep 2020), 19-22. DOI=10.5120/ijca2020920693

@article{ 10.5120/ijca2020920693,
author = { Kartik Singh Prajapati, Uday Chourasia, Raju Baraskar },
title = { Security of Fog Storage by using Hybrid Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2020 },
volume = { 175 },
number = { 18 },
month = { Sep },
year = { 2020 },
issn = { 0975-8887 },
pages = { 19-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number18/31552-2020920693/ },
doi = { 10.5120/ijca2020920693 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:25:23.034164+05:30
%A Kartik Singh Prajapati
%A Uday Chourasia
%A Raju Baraskar
%T Security of Fog Storage by using Hybrid Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 18
%P 19-22
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud has many advantages but their security is a major issue. It also has less mobility, higher time consumption in transferring data due to multihost. In our proposed system, Fog Computing(FC) is used. FC extends cloud computing services to the network edge.FC can provide more security to the cloud, their outsider sends the encrypted data to another user via fog and generates a .pem encrypted key for decryption & encryption. This key is generated by hybrid cryptography & its security is better than the existing (AES) Algorithm. Function &services of security like cryptography are loaded on fog needs which decrease storage on IoT devices & computation. The proposed system is an encryption scheme for fog IoT devices communication that used algorithms such as AES CCM, AES GCM, Fernet, Multifernet, Chacha20Poly1305is symmetric key encryption

References
  1. F.De. Santis, A. Schauer, G.Sigi, “ChaCha20Poly1305 authenticated encryption for high speed embedded IoT applications“, in 2017 Design Automation and Test in Europe.
  2. V.S. Mahalle, A. K. Shahade, “Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm”, IEEE, INPAC, pp 146-149, Oct. 2014.
  3. Palash Uddin, Abu Marjan, “Developing Efficient Solution to Information Hiding through text steganography along with cryptography”, IEEE, IFOST, pages 14-17, October 2014.
  4. R. T. Patil and P. S. Bhendwade, “Steganographic Secure Data Communication”, IEEE, International Conference on Communication and Signal Processing, pages 953-956, April 2014.
  5. Klaus Hofmann and S. Hesham, “High Throughput Architecture for the Advanced Encryption Standard Algorithm” IEEE, International Symposium on Design and Diagnostics of Electronic Circuits & Systems, pages 167- 170, April 2014.
  6. R. Housley, “Using AES-CCM and AES-GCM auth. Encryption in Cryptographic message syntax”, in 2007 Network Working Group.
  7. Neha Shrikant Dhande, FOG COMPUTING: REVIEW OF PRIVACY AND SECURITY ISSUES, International Journal of Engineering Research and General Science Volume 3, Issue 2, March-April, 2015.
  8. M. N Wahid, A. Ali, B. Esparham, M. Marwan,” Comparison of crypto. Algo: DES, 3DES, AES, RSA & blowfish for guessing attacks prevention” in 2018 Comp Sci Appl Technol
Index Terms

Computer Science
Information Sciences

Keywords

Fog computing cloud computing cryptography security.