BSKM-FC: Blockchain-based secured key management in a fog computing environment
【Author】 Gowda, Naveen Chandra; Manvi, Sunilkumar S.; Malakreddy, A. Bharathi; Lorenz, Pascal
【Source】FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
【影响因子】7.307
【Abstract】With an increase in the number of devices in the edge layer connected to the fog server of the fog computing environment, it is found that vulnerable and unauthorized activities are also increasing relatively. Thus, there is a requirement for authorized access control in such an environment that is governed by secured and efficient key management between the communicating devices. Many researchers have presented conventional solutions for key management depending on a third party. The third party operated for a key generation or key distribution in a fog computing environment based on a centralized architecture which leads to the drawbacks like a single-point failure and inconsistency of key management. So, effective and secured key management between the edge devices which are willing to communicate is the major concern to be addressed in the current digital world to achieve access control. This paper proposes a BSKM-FC (Blockchain-based Secured Key Management in a Fog Computing Environment) which is a decentralized system in a fog computing environment without using a third party. The BSKM-FC makes use of a one-way hash chain for the generation of private and public key pairs and ECC (Elliptic Curve Cryptography) for secured sharing. Upon successful authentication, the session key generation at both edge devices is based on the key pair provided by the fog server and stored securely in the blockchain. The BSKM-FC system uses private blockchain technology in the fog layer to provide secured storage and management. The work is implemented in the Truffle Blockchain and found that BSKM-FC performs better in terms of overall block preparation time. The security analysis of the proposed scheme is carried out based on the ROR model and also verified using AVISPA for some known attacks. Informal security analysis of the proposed work is performed by considering some of the known attacks where we observe that the proposed scheme overcomes such attacks. Performance overhead analysis is demonstrated using MIRACL considering computation cost, communication cost, and storage cost. The results show that the proposed scheme meets security requirements and performs effectively. The computation overhead, communication overhead, storage overhead, and block preparation time of the proposed scheme were improved by 7% to 14%, 9% to 18%, 7% to 17%, and 14% to 28%, respectively, as compared to existing schemes. (c) 2023 Elsevier B.V. All rights reserved.
【Keywords】Fog computing; Key management; Blockchain; Authentication; ROR (Real-Or-Random); AVISPA (Automated Validation of Internet; Security Protocols and Applications); MIRACL (Multiprecision Integer and; Rational Arithmetic Cryptographic Library)
【发表时间】2023 MAY
【收录时间】2023-04-20
【文献类型】实验仿真
【主题类别】
区块链技术-协同技术-雾计算
评论