Hierarchical Attribute-based Encryption Scheme to Secure Fog and IoT Communications
M. Anuradha1, P. Govindaraju2
1Dr. M. Anuradha, Ph.D, Associate Professor, Department of Computer Science and Engineering, St. Martin’s Engineering College, Secunderabad, Dhulapally (Telangana), India.
2P. Govindaraju, Ph.D, Associate Professor, Department of Computer Science and Engineering, St. Martin’s Engineering College, Secunderabad, Dhulapally (Telangana), India.
Manuscript received on 15 December 2019 | Revised Manuscript received on 22 December 2019 | Manuscript Published on 31 December 2019 | PP: 154-156 | Volume-9 Issue-1S6 December 2019 | Retrieval Number: A10301291S619/19©BEIESP | DOI: 10.35940/ijeat.A1030.1291S619
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Haze looking after is taken into consideration as a essentially virtualized trouble of view that could lure figuring on the internet of factors devices, residing inside the edge of the shape, to skip on establishments and applications notably greater proficiently and as it should be. at the same time as you understand that darkness figuring begins offevolved from and is a non-trifling augmentation of scattered enlisting, it gets particular safety and affirmation problems of dispersed managing, inflicting the an extended way wearing out troubles within the evaluation put together. To attach actual and puzzle correspondences amongst a celebration of haze focuses, in this paper, we recommend an awesome key exchange display relying on Hierarchical characteristic-based totally Encryption (HABE) to create comfy exchanges some of the human beings. To perform insurance, attestation, eccentricity, and get right of get entry to to manipulate, we be a part of HABE and impelled imprint frameworks. We separate the capability of our display like protection and execution. We besides execute our display and distinction it and the confirmation based completely genuinely plan to show its achievability.
Keywords: HABE, Fog Computing, IoT.
Scope of the Article: IoT