Fog computing is considered as a significantly virtualized perspective that can enable preparing at the Internet of Things devices, living in the edge of the framework, to convey organizations and applications even more capably and feasibly. Since Fog preparing starts from and is a non-minor development of circulated registering, it gets various security and insurance troubles of dispersed processing, causing the expansive stresses in the examination gathering. To engage genuine and confidential exchanges among a social occasion of fog centre points, proposes a capable key exchange show in perspective on figure content approach characteristic based encryption to develop secure correspondences among the individuals. To achieve confidentiality, approval, capriciousness, and access control, to join CP-ABE and mechanized mark techniques. The proposed method explores the efficiency to show similar to security and execution.
CITATION STYLE
Karuna, G., Goutami, B., & Rupa, B. (2019). An encrypted key exchange protocol to secure communication among fog nodes and the cloud. International Journal of Innovative Technology and Exploring Engineering, 8(12), 5193–5197. https://doi.org/10.35940/ijitee.L2778.1081219
Mendeley helps you to discover research relevant for your work.