Advances of Science and Technology. 7th EAI International Conference, ICAST 2019, Bahir Dar, Ethiopia, August 2–4, 2019, Proceedings

Research Article

Reconfigurable Integrated Cryptosystem for Secure Data Exchanges Between Fog Computing and Cloud Computing Platforms

Download143 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-43690-2_35,
        author={Abiy Tadesse Abebe and Yalemzewd Negash Shiferaw and P. Kumar},
        title={Reconfigurable Integrated Cryptosystem for Secure Data Exchanges Between Fog Computing and Cloud Computing Platforms},
        proceedings={Advances of Science and Technology. 7th EAI International Conference, ICAST 2019, Bahir Dar, Ethiopia, August 2--4, 2019, Proceedings},
        proceedings_a={ICAST},
        year={2020},
        month={6},
        keywords={AEGIS Authenticated encryption FPGA Integrated cryptosystem Key distribution RSA},
        doi={10.1007/978-3-030-43690-2_35}
    }
    
  • Abiy Tadesse Abebe
    Yalemzewd Negash Shiferaw
    P. Kumar
    Year: 2020
    Reconfigurable Integrated Cryptosystem for Secure Data Exchanges Between Fog Computing and Cloud Computing Platforms
    ICAST
    Springer
    DOI: 10.1007/978-3-030-43690-2_35
Abiy Tadesse Abebe1,*, Yalemzewd Negash Shiferaw1,*, P. Kumar2,*
  • 1: Addis Ababa Institute of Technology, AAU
  • 2: Ambo University
*Contact email: abiytds@yahoo.com, yalemzewdn@yahoo.com, pendemsuresh@gmail.com

Abstract

This study is aimed to propose a cryptosystem which integrates only two algorithms for secure data transmissions during fog nodes to cloud server communications. It provides a method of authenticated key distribution and authenticated encryption with robust and multiple crypto services. It is optimized for high throughput achievement based on FPGA to improve the efficiency of the existing hybrid cryptosystems and integrated encryption schemes which incorporated many independent algorithms for strong security. The separate keys which are needed for each component algorithm leading to extra key management and key storage requirements and the overall hardware complexity with increased computation cost are some of the limitations of the existing methods. The implementation outcomes show the efficiency, enhanced throughput, and reasonable resource utilization of the proposed method compared to the existing reported outcomes. It can be suitable for securing data exchanges among high performance computing environments including secure communications between fog computing layer and central cloud which require high speed cryptosystems with strong security and lower latency.