Skip to main content

Reconfigurable Integrated Cryptosystem for Secure Data Exchanges Between Fog Computing and Cloud Computing Platforms

  • Conference paper
  • First Online:
Advances of Science and Technology (ICAST 2019)

Abstract

This study is aimed to propose a cryptosystem which integrates only two algorithms for secure data transmissions during fog nodes to cloud server communications. It provides a method of authenticated key distribution and authenticated encryption with robust and multiple crypto services. It is optimized for high throughput achievement based on FPGA to improve the efficiency of the existing hybrid cryptosystems and integrated encryption schemes which incorporated many independent algorithms for strong security. The separate keys which are needed for each component algorithm leading to extra key management and key storage requirements and the overall hardware complexity with increased computation cost are some of the limitations of the existing methods. The implementation outcomes show the efficiency, enhanced throughput, and reasonable resource utilization of the proposed method compared to the existing reported outcomes. It can be suitable for securing data exchanges among high performance computing environments including secure communications between fog computing layer and central cloud which require high speed cryptosystems with strong security and lower latency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stinson, D.R., Paterson, M.B.: Cryptography Theory and Practice, 4th edn, pp. 1–9. CRC Press, Boca Raton (2019)

    MATH  Google Scholar 

  2. McGrew, D., Viega, J.: The Galois/Counter Mode of operation (GCM). Submission to NIST, May 2005

    Google Scholar 

  3. Koteshwara, S., Das, A.: Comparative study of authenticated encryption targeting lightweight IoT applications. IEEE Des. Test 34(4), 26–33 (2017)

    Article  Google Scholar 

  4. Pang, L., Kou, M., Wei, M., Li, H.: Efficient anonymous certificateless multi-receiver signcryption scheme without bilinear pairings. IEEE Access 6, 78123–78135 (2018). https://doi.org/10.1109/access.2018.2884798

    Article  Google Scholar 

  5. Zia, M., Ali, R.: Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve. Electron. Lett. (2019). https://doi.org/10.1049/el.2019.0032

    Article  Google Scholar 

  6. Gutub, A.A, Khan, F.A.: Hybrid crypto hardware utilizing symmetric-key & public-key cryptosystems. In: IEEE International Conference on Advanced Computer Science Applications and Technologies (ACSAT), pp. 116–121 (2013)

    Google Scholar 

  7. Alkady, Y., Habib, M.I., Rizk, R.Y.: A new security protocol using hybrid cryptography algorithms. In: IEEE International Computer Engineering Conference (ICENCO), pp. 109–115 (2013)

    Google Scholar 

  8. Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie-Hellman assumptions and an analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 143–158. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45353-9_12

    Chapter  Google Scholar 

  9. Martínez, V.G., Encinas, L.H., Dios, A.Q.: Security and practical considerations when ımplementing the elliptic curve ıntegrated encryption scheme. Cryptologia 39(3), 244–269 (2015). https://doi.org/10.1080/01611194.2014.988363

    Article  Google Scholar 

  10. Martin, et al.: OpenFog security requirements and approaches. In: IEEE Communications Society Invited Paper, November 2017

    Google Scholar 

  11. Rodríguez-Andina, J., Torre-Arnanz, E., Valdés-Peña, M.: FPGAs Fundamentals, Advanced Features, and Applications in Industrial Electronics. CRC Press, Boca Raton (2017)

    Book  Google Scholar 

  12. Wu, H., Preneel, B.: AEGIS: a fast authenticated encryption algorithm. In: Lange, T., Lauter, K., Lisoněk, P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 185–201. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-43414-7_10

    Chapter  Google Scholar 

  13. FIPS Publication 197, the Advanced Encryption Standard (AES), U.S. DoC/NIST, November 2001

    Google Scholar 

  14. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signature and public-keycryptosystems. Commun. ACM 21, 120–126 (1978)

    Article  Google Scholar 

  15. Tadesse Abebe, A., Negash Shiferaw, Y., Gebeye Abera, W., Kumar, P.G.V.S.: Efficient FPGA ımplementation of an ıntegrated bilateral key confirmation scheme for pair-wise key-establishment and authenticated encryption. In: Zimale, F.A., Enku Nigussie, T., Fanta, S.W. (eds.) ICAST 2018. LNICST, vol. 274, pp. 429–438. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-15357-1_36

    Chapter  Google Scholar 

  16. Montgomery, P.: Modular multiplication without trial division. Math. Comput. 44, 519–521 (1985)

    Article  MathSciNet  Google Scholar 

  17. Abdellatif, K.M., Chotin-Avot, R., Mehrez, H.: AES-GCM and AEGIS: efficient and high speed hardware ımplementations. J. Signal Process. Syst. 88(1), 1–12 (2016). https://doi.org/10.1007/s11265-016-1104-y

    Article  Google Scholar 

  18. Katsaiti, M., Sklavos, N.: Implementation Efficiency and Alternations, on CAESAR Finalists: AEGIS Approach, pp. 661–665. https://doi.org/10.1109/dasc/picom/datacom/cyberscitec.2018.00117

  19. Sandoval, M.M., Uribe, C.F.: A hardware architecture for elliptic curve cryptography and lossless data compression. In: IEEE International Conference on Electronics, Communications and Computers, pp. 113–118 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abiy Tadesse Abebe .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tadesse Abebe, A., Negash Shiferaw, Y., Kumar, P.G.V.S. (2020). Reconfigurable Integrated Cryptosystem for Secure Data Exchanges Between Fog Computing and Cloud Computing Platforms. In: Habtu, N., Ayele, D., Fanta, S., Admasu, B., Bitew, M. (eds) Advances of Science and Technology. ICAST 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 308. Springer, Cham. https://doi.org/10.1007/978-3-030-43690-2_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-43690-2_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-43689-6

  • Online ISBN: 978-3-030-43690-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics