Load balancing of fog computing centre and its security using elliptic curve cryptography
by Yogita Pagar; Dilip Rathod; Girish Chowdhary
International Journal of Autonomic Computing (IJAC), Vol. 3, No. 3/4, 2020

Abstract: The internet of things (IoT) and the fog computing paradigm are the next wave in the era of computing and have been emerging technologies in the fields of computer science and information technology. Prior research concentrates on the integration of IoT and fog computing but is limited because it cannot be extended to all applications due to inadequate security architecture. In this paper, we propose a biocryptography approach using biometric key generation for elliptic curve cryptography (ECC) based on the authentication of fog computing. In biometric-based ECC, a private key is generated via the fingerprint of the user ensures complete protection against security risks such as confidentiality, authentication, integrity, and privacy. The security strengths of various public key cryptosystems are analysed, and ECC is one of the best cryptosystems for fog-based IoT middleware.

Online publication date: Tue, 20-Apr-2021

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Autonomic Computing (IJAC):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com