Securing Fog Storage Nodes using an Attribute-based Encryption Scheme and Multi-Factor Authentication
J.Velmurugan1, S.Manjula2

1J.Velmurugan*, Department of Information Technology, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai, India. Affiliated to Anna University, Chennai.
2S.Manjula, Department of Electronics and Communication Engineering Rajalakshmi Institute of Technology.
Manuscript received on September 22, 2019. | Revised Manuscript received on October 20, 2019. | Manuscript published on October 30, 2019. | PP: 2559-2563 | Volume-9 Issue-1, October 2019 | Retrieval Number: F8413088619/2019©BEIESP | DOI: 10.35940/ijeat.F8413.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Fog computing is an extended and distributed infrastructure where the application processes are managed between the end devices and the edge of the grouped system for better and reliable services. Fog computing is a non-insignificant augmentation of cloud which comes in to the same security and production difficulties of cloud computing. Existing conventional techniques like digital certificates and signature verification schemes suffers due to the advancement of cyber criminals in revoking the certificates. To enable authentication and confidentiality among a group of gathered fog nodes, in this paper, a novel CP-ABE based scheme along with multi-factor user authentication (CP-ABE-MA) is proposed. Further, the paper uses some obfuscation technique which obscures the data to evade the illegal user access. In general, the cloud is a RAW data type which consists of any data format, hence respective on the data type the encryption conversion can be used. CP-ABE can be connected to letters in order and alphanumeric sort of information and jumbling can be connected to a numeric kind of information. Applying encryption methods on the cloud information will give more security against unapproved use. Privacy could be accomplished with a blend of encryption and confusion. In order to evaluate the efficiency, the proposed protocol is implemented and tested in AVISPA and compared with the certificate-based schemes. Further, the proposed protocol outflanks the existing certificate based schemes with 97% accuracy.
Keywords: Fog computing, CP-ABE, CP-ABE-MA, Multifactor Authentication, AVISPA.