INTEGRATED ENCRYPTION SCHEME IN FOG COMPUTING FOR E-HEALTHCARE APPLICATION

Authors

  • Priyanka Rajan Kumar
  • Sonia Goel

Keywords:

Fog Computing, Internet of Things (IoT), Rivest, Adi Shamir, and Leonard Adleman (RSA), Advanced Encryption Standard (AES) Transport Layer Security (TLS), BLOWFISH.

Abstract

E-Health is a system of providing health services by making use of electronic technologies. They provide improved, flexible, and affordable health services to a large population, especially in situations like a pandemic. The IoT is helping them to connect, generate and share a huge amount of data. This system of online sharing of health records and advice is generating data at rapid growth. This large data is to be managed in terms of storage, processing, transmission, privacy, and security. The cloud came up as a source of big data management but when it came to latency and bandwidth consumption, a system of processing near the edge came as a Fog Computing with distributed processing, reduced delay, and less bandwidth. The Fog is near the generation of data that provides benefits like location awareness, heterogeneity, real-time access, wireless access, and scalability. Here the security of sensitive data is a prime factor. Security can be achieved with cryptography. The paper implemented RSA, BLOWFISH, AES, and Integrated Encryption Scheme of (RSA+BLOWFISH) and (RSA+AES) combination security algorithms in the Fog-enabled E-Healthcare system. The comparison of performance is done on the basis of key size, encryption-decryption time, and throughput. It is found that BLOWFISH has the least encryption-decryption time and more throughput in a single encryption scheme. In the Integrated Encryption Scheme, the (RSA+AES) combination has improved performance among the two combinations. So, to achieve the security of the E-Health system in the Fog computing environment it is more efficient to use Integrated Encryption Scheme. 

References

Ai, Yuan, Mugen Peng, and Kecheng Zhang. "Edge computing technologies for Internet of Things: a primer." Digital Communications and Networks 4, no. 2 (2018): 77-86.

Al-Khafajiy, Mohammed, Thar Baker, Atif Waraich, Dhiya Al-Jumeily, and Abir Hussain. "IoT-fog optimal workload via fog offloading." In 2018 IEEE/ACM international conference on utility and cloud computing companion (UCC companion), pp. 359-364. IEEE, 2018.

Alrawais, Arwa, Abdulrahman Alhothaily, Chunqiang Hu, Xiaoshuang Xing, and Xiuzhen Cheng. "An attribute-based encryption scheme to secure fog communications." IEEE access 5 (2017): 9131-9138.

Atlam, Hany F., Ahmed Alenezi, Abdulrahman Alharthi, Robert J. Walters, and Gary B. Wills. "Integration of cloud computing with internet of things: challenges and open issues." In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 670-675. IEEE, 2017.

Atlam, Hany F., Ahmed Alenezi, Raid Khalid Hussein, and Gary B. Wills. "Validation of an Adaptive Risk-based Access Control Model for the Internet of Things." International Journal of Computer Network & Information Security 10, no. 1 (2018).

Atlam, Hany F., Ahmed Alenezi, Robert John Walters, and Gary B. Wills. "An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things." IoTBDS 4 (2017): 254-260.

Blaze, Matt, Gerrit Bleumer, and Martin Strauss. "Divertible protocols and atomic proxy cryptography." In International Conference on the Theory and Applications of Cryptographic Techniques, pp. 127-144. Springer, Berlin, Heidelberg, 1998.

Bonomi, Flavio, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. "Fog computing and its role in the internet of things." In Proceedings of the first edition of the MCC workshop on Mobile cloud computing, pp. 13-16. 2012.

Bonomi, Flavio, Rodolfo Milito, Preethi Natarajan, and Jiang Zhu. "Fog computing: A platform for internet of things and analytics." In Big data and internet of things: A roadmap for smart environments, pp. 169-186. Springer, Cham, 2014.

Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval. "Elliptic Curve Lightweight Cryptography: a Survey." IEEE Dataport, November 8, 2018. doi: https://dx.doi.org/10.21227/bqfj-6c39.

Diro, Abebe Abeshu, Naveen Chilamkurti, and Yunyoung Nam. "Analysis of lightweight encryption scheme for fog-to-things communication." IEEE Access 6 (2018): 26820-26830.

Farjana, Nishat, Shanto Roy, Md Mahi, Julkar Nayeen, and Md Whaiduzzaman. "An identity-based encryption scheme for data security in fog computing." In Proceedings of the International Joint Conference on computational intelligence, pp. 215-226. Springer, Singapore, 2020.

Giang, Nam Ky, Seonghoon Kim, Daeyoung Kim, Markus Jung, and Wolfgang Kastner. "Extending the EPCIS with Building automation systems: a new information system for the internet of things." In 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 364-369. IEEE, 2014.

Huang, Qinlong, Yixian Yang, and Licheng Wang. "Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things." IEEE Access 5 (2017): 12941-12950.

Khan, Saad, Parkinson, Simon, and Qin, Yongrui. "Fog computing security: a review of current applications and security solutions." Journal of Cloud Computing: Advances, Systems and Applications, 2017.

Kulkarni S, Saha S, Hockenbury R. "Preserving privacy in sensor-fog networks." In: Internet Technology and Secured Transactions (ICITST), 2014, 9th International Conference For. IEEE, pp 96-99, 2014.

Miao, Yinbin, Jianfeng Ma, Ximeng Liu, Jian Weng, Hongwei Li, and Hui Li. "Lightweight fine-grained search over encrypted data in fog computing." IEEE Transactions on Services Computing 12, no. 5 (2018): 772-785.

Mohd, Bassam J., and Thaier Hayajneh. "Lightweight block ciphers for IoT: energy optimization and survivability techniques." IEEE Access 6 (2018): 35966-35978.

Mustacoglu, Ahmet F., Ferhat O. Catak, and Geoffrey C. Fox. "Password‐based encryption approach for securing sensitive data." Security and Privacy 3, no. 5 (2020): e121.

N the Ni, Jianbing, Kuan Zhang, Xiaodong Lin, and Xuemin Shen. "Securing fog computing for internet of things applications: Challenges and solutions." IEEE Communications Surveys & Tutorials 20, no. 1 (2017): 601-628.

Patil, P. V. "Fog Computing." International Journal of Computer Applications (0975-8887), National Conference on Advancements in Alternate Energy Resources for Rural Applications (AERA-2015), 2015.

Peter, Nisha. "Fog computing and its real-time applications." Int. J. Emerg. Technol. Adv. Eng 5, no. 6 (2015): 266-269.

Pranati V. Patil’ “Fog Computing” International Journal of Computer Applications International Journal of Computer Applications (0975-8887), National conference on Advancements in Alternate Energy Resources for Rural Applications(AERA-2015), 2015.

Schumacher M, Fernandez-Bugloioni E, Hybertson D, Buschmann F, Sommerland P. Security Patterns: Integrating security and systems engineering. Wiley, 2013.

Shi, Yingjuan, Gejian Ding, Hui Wang, H. Eduardo Roman, and Si Lu. "The fog computing service for healthcare." In 2015 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), pp. 1-5. IEEE, 2015.

Suárez-Albela, Manuel, Tiago M. Fernández-Caramés, Paula Fraga-Lamas, and Luis Castedo. "A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications." Sensors 17, no. 9 (2017): 1978.

Tsai, Kun-Lin, Fang-Yie Leu, Ilsun You, Shuo-Wen Chang, Shiung-Jie Hu, and Hoonyong Park. "Low-power AES data encryption architecture for a LoRaWAN." IEEE Access 7 (2019): 146348-146357.

Vaquero, Luis M., and Luis Rodero-Merino. "Finding your way in the fog: Towards a comprehensive definition of fog computing." ACM SIGCOMM computer communication Review 44, no. 5 (2014): 27-32.

Verma, Manisha, Neelam Bhardwaj, and Arun Kumar Yadav. "Real-time efficient scheduling algorithm for load balancing in fog computing environment." Int. J. Inf. Technol. Comput. Sci 8, no. 4 (2016): 1-10.

Wen, Zhenyu, Renyu Yang, Peter Garraghan, Tao Lin, Jie Xu, and Michael Rovatsos. "Fog orchestration for internet of things services." IEEE Internet Computing 21, no. 2 (2017): 16-24.

Yi, Shanhe, Zijiang Hao, Zhengrui Qin, and Qun Li. "Fog computing: Platform and applications." In 2015 Third IEEE workshop on hot topics in web systems and technologies (HotWeb), pp. 73-78. IEEE, 2015.

Zhang, Peng, Joseph K. Liu, F. Richard Yu, Mehdi Sookhak, Man Ho Au, and Xiapu Luo. "A survey on access control in fog computing." IEEE Communications Magazine 56, no. 2 (2018): 144-149.

Zhang, Wenjuan, and Gang Li. "An efficient and secure data transmission mechanism for Internet of vehicles considering privacy protection in fog computing environment." IEEE Access 8 (2020): 64461-64474.

Zhang, Wenjuan, and Gang Li. "An efficient and secure data transmission mechanism for Internet of vehicles considering privacy protection in fog computing environment." IEEE Access 8 (2020): 64461-64474.

Downloads

Published

2023-12-30

How to Cite

Priyanka Rajan Kumar, & Sonia Goel. (2023). INTEGRATED ENCRYPTION SCHEME IN FOG COMPUTING FOR E-HEALTHCARE APPLICATION. Journal Punjab Academy of Sciences, 23, 16–32. Retrieved from http://jpas.in/index.php/home/article/view/84