A Model for Data Confidentiality and Integrity during Replication in Fog & Edge Computing Environment

International Journal of Computer Science and Engineering
© 2024 by SSRG - IJCSE Journal
Volume 11 Issue 6
Year of Publication : 2024
Authors : Alalibo, H., Bennett, E.O

pdf
How to Cite?

Alalibo, H., Bennett, E.O, "A Model for Data Confidentiality and Integrity during Replication in Fog & Edge Computing Environment," SSRG International Journal of Computer Science and Engineering , vol. 11,  no. 6, pp. 53-60, 2024. Crossref, https://doi.org/10.14445/23488387/IJCSE-V11I6P108

Abstract:

In the study of confidentiality and integrity during replication in fog and edge computing environments, the SHA256 hashing algorithm and the PyCryptodome library played crucial roles. The SHA-256 algorithm, a member of the SHA2 family, was employed for its robust cryptographic hash function, ensuring data integrity by generating a unique, fixed-size 256-bit hash value for every input. This characteristic was pivotal in detecting any alterations to the data, thereby preserving its integrity during transmission and storage. The PyCryptodome library, an extensive suite of cryptographic functions, was utilized to implement the SHA-256 algorithm effectively. This library provided the necessary tools to integrate advanced cryptographic techniques into the system, enhancing the security of data replication processes. By leveraging these technologies, the study aimed to establish a secure framework that safeguarded data confidentiality and integrity across distributed fog and edge computing environments. The results demonstrated the feasibility and efficacy of using SHA-256 and PyCryptodome in mitigating potential security threats, thereby contributing to the development of more resilient and trustworthy computing infrastructures. Object-Oriented Development (OOD) is employed to decrease development schedules, reduce resource demands, and improve code reusability. Python serves as the programming language, while MySQL functions as the database.

Keywords:

Ensuring data confidentiality, Integrity assurance, Secure data replication, Encryption techniques, Access control mechanisms, Data integrity verification, Privacy-preserving strategies.

References:

[1] Bo Li et al., “Inspecting Edge Data Integrity with Aggregate Signature in Distributed Edge Computing Environment,” IEEE Transactions on Cloud Computing, vol. 10, no. 4, pp. 2691-2703, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Yang Ming, and Wenchang Shi, “Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage,” IEEE Access, vol. 7, pp. 122091-122105, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Mohammed Islam Naas et al., “IoT Data Replication and Consistency Management in Fog Computing,” Journal of Grid Computing, vol. 19, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] A.V. Dastjerdi et al., “Chapter 4 - Fog Computing: Principles, Architectures, and Applications,” Internet of Things, pp. 61-75, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Wided Ben Daoud et al., “Fog Computing Network Security Based on Resources Management,” EURASIP Journal on Wireless Communications and Networking, vol. 2023, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Esmaeil Torabi, Mostafa Ghobaei-Arani, and Ali Shahidinejad, “Data Replica Placement Approaches in Fog Computing: A Review,” Cluster Computing, vol. 25, no.5, pp. 3561-3589, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Uma Maheswari Kaliyaperumal, Mary Saira Bhanu Somasundaram, and Nickolas Savarimuthu, “Partitioning-Based Data Sharing Approach for Data Integrity Verification in Distributed Fog Computing,” International Journal of Engineering and Technology Innovation, vol. 13, no. 2, pp. 160–174, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Hui Tian et al., “Privacy-Preserving Public Auditing for Secure Data Storage in Fog-to-Cloud Computing,” Journal of Network and Computer Applications, vol. 127, pp. 59-69, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[9] A. Fatimeh, B. Ali, and C. Smith, “Analysis of Cloud, Fog, and Edge Computing Data Replication Methods: A Systematic Literature Review,” Journal of Computing Research, vol. 29, no. 2, pp. 145-167, 2024.
[10] Aleksandr Ometov et al., “A Systematic Literature Review on Security Challenges in Cloud, Edge, and Fog Computing,” Journal of Cloud Computing, vol. 11, no. 3, pp. 275-302, 2022.
[11] Fatemeh Karamimirazizi, Seyed Mahdi Jameii, and Amir Masoud Rahmani, “Data Replication Methods in Cloud, Fog, and Edge Computing: A Systematic Literature Review,” Wireless Personal Communications, vol. 135, pp. 531-561, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Aleksandr Ometov et al., “A Survey of Security in Cloud, Edge, and Fog Computing,” Sensors, vol.22, no.3, pp. 1-27, 2022.
[CrossRef] [Google Scholar] [Publisher Link]