SlideShare a Scribd company logo
© 2018, AJCSE. All Rights Reserved 22
RESEARCH ARTICLE
Fog and Internet of Things Network Security through Blowfish Cipher
B. Usharani
Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Green Fields,
Guntur, Andhra Pradesh, India
Received: 02-12-2017; Revised: 25-12-2017; Accepted: 20-01-2018
ABSTRACT
The data are stored and accessed in a cloud from the remote server with the help of services provided by
cloud service providers. Security is a major issue as the data are transmitted to the remote server through
the internet. Encryption is a better solution to secure the information when storing data at remote servers.
Fog computing is evolved to overcome the security issues in cloud. Still, there are some data security
issues in fog computing. An encryption algorithm plays a key role in the cloud security. Network-based
intrusion prevention system is used to detect threats in real time. To provide a secure data access in cloud,
advanced encryption techniques can be used for storing and retrieving data from cloud. Furthermore,
proper key management techniques can be used to distribute the key to the cloud users such that only
authorized persons can access the data. The Blowfish encryption can never be hacked. In this paper,
Blowfish cipher technique is implemented for the security to fog of internet of things network.
Key words: Blowfish, cipher techniques, fog, internet of things, network security
INTRODUCTION
As the number of devices connected to internet
increases, there would be definitely a problem
in storage and information retrieval process. Fog
computing has been introduced overcome the
security issues in the cloud computing. Huge
amount of data produced by internet of things (IoT)
devices and storing data into cloud and retrieving
is highly difficult. Hence, fog has been introduced.
IoThad led evolution to the fog computing because
of the increased number of devices producing
massive amount of data. In cloud computing, there
are many security issues as of man in the middle
attack and even the encryption of data is not safe
method for cloud. It does not identify the difference
between user and attacker. It does not concentrate
on the security of the data. Cloud provides various
services for storing and accessing of the data in
which the major problem is that failure to provide
security for the data against attackers. It is not
providing any level of assurance to the user about
the security of the data. Hence, developing a more
secure cloud is not enough because there would
Address for correspondence:
B. Usharani,
E-mail: ushareddy.vja@gmail.com
be continuous attacks happening on the cloud, and
there are chances that the data would be leaked
or it might be lost forever. Hence, fog computing
came into existence which is considered to be
the most secure form of data storage. Hence, in
this, we are trying to achieve more security at the
level of fog by introducing encryption to the data
using the Blowfish encryption standard algorithm
technique. The paper introduces Blowfish
algorithm in the fog environment, so whenever
user sends data to fog for storing in the cloud, the
fog will encrypt the data and send it to the cloud.
Moreover, whenever user requests for the data, the
encrypted data travel from cloud to fog and fog
to end user, and the data will be decrypted at end
user.
FOG COMPUTING [FIGURE 1]
In cloud computing concept, all the data produced
from the users will be directly stored into the cloud
and then it is analyzed with massive warehouses
with analytics going on it and then decisions are
made to act on data, and eventually, notifications
are pushed to act on those decisions. In fog
computing, the users will be notified what are the
actions that are needed to be taken on the data and
then analytics are applied on the received data and
Available Online at www.ajcse.info
Asian Journal of Computer Science Engineering 2018;3(1):22-26
ISSN 2581 – 3781
Usharani: Security in Fog by Blowfish
AJCSE/Jan-Mar-2018/Vol 3/Issue 1 23
stored it into the cloud. Fog computing is said to
be an extension of the cloud but not a replacement
of it. As the number of the devices connected to
the internet has been increasing at rapid speed, and
even advancement in the IoT has led this number
to increase drastically [Figure 2].
IoT devices interact with fog nodes only when
they need to offload a processing or storage
request. Any other interactions would not be
considered as part of the fog environment as such
communications would happen as part of the
network. These fog nodes interact with each other
when they need to effectively manage network
resources or to manage network itself. They may
even operate in distributed manner to perform
a specific task. To secure communications in
a fog computing environment, the following
communications between these devices are to be
secured:
1. Communications between constrained - IoT
devices and fog nodes and
2. Communications between fog nodes.
Usually, an IoT device can initiate communication
with any of the fog nodes in the fog network
requesting for a processing or storage requirement.
RELATED WORK
Alrawais et al. discussed the security and privacy
challenges of fog computing in IoT environments.
They discussed how to use fog computing to
improve the security and privacy issues in IoT
environments. In addition, Hong et al. evaluated
the programming model for large scale and
latency sensitive IoT applications exploiting the
fog computing platform. They studied the model
with a camera network and connected vehicle
applications and showed the efficient role of fog
computing in IoT. Al Faruque and Vatanparvar
proposed a software-defined network based on
vehicle ad hoc networking supported by fog
computing. The proposed architecture solves
many issues in vehicle ad hoc networks by rising
the connectivity between vehicles, vehicle-to-
infrastructure, and vehicle to base station while
integrating fog computing to decrease latency and
provide resource utility. Koo and Hur proposed a
deduplication scheme for encrypted data.
CIPHER TECHNIQUES
The original message is called as the plain text.
The coded message is known as ciphertext. The
process of converting plain text to ciphertext is
known as encryption or enciphering.
Cryptographic algorithms and protocols are
divided into four categories:
1. Symmetric encryption
2. Asymmetric encryption
3. Data integrity algorithms
4. Authentication protocols.
Network and Internet security consists of
measures to deter, prevent, detect, and correct
security violations that involve the transmission
of information. A logical information channel
is established by defining the route through the
internet from source to destination by the use of
communication protocols such as transmission
control protocol/internet protocol by the sender
and receiver.
Figure 1: Fog computing architecture
Figure 2: An example for IOT based on fog computing
Usharani: Security in Fog by Blowfish
AJCSE/Jan-Mar-2018/Vol 3/Issue 1 24
Encryption key is used in conjunction with the
transformation to scramble the message before
transmission and unscramble it on receiver side.
Symmetric encryption is a form of cryptosystem
in which encryption and decryption are performed
using the same key. Symmetric encryption
transforms plain text into ciphertext using a secret
key and encryption algorithm.
E(K,X)	 (1)
Symmetric encryption of plain text X using secret
key K.E. is the encryption algorithm applied on
the plain text and key to transform to a ciphertext.
The process of converting ciphertext to plain text
is known as decryption or deciphering. In the
symmetric encryption, using the same key that is
used for encryption and a decryption algorithm,
the plain text is recovered from the ciphertext.
D(K,Y) (2)
Symmetric encryption of ciphertext Y using secret
key K.D. is the decryption algorithm applied on
the ciphertext and key to recover original message.
With the message X and the encryption key
as input, the encryption algorithm forms the
ciphertext Y=(Y1
,Y2
,Y3
,…….Yn
).
Y=E(K,X)
With the cipher message Y and the decryption key
as input, the decryption algorithm forms the plain
text
X=D(K,Y)
Security of an encryption scheme depends on the
length of the key.
BLOWFISH CIPHER TECHNIQUE
Blowfish is an encryption algorithm that can be
used as a replacement for the data encryption
standard (DES) or International Data Encryption
Algorithm (IDEA) algorithms. It is a symmetric
or conventional block cipher that uses a variable-
length key, from 32 bits to 448 bits. Blowfish uses
a 64-bit block size and a key length of any size
from 32 bits to 448 bits. It is a 16-round Feistel
cipher and uses large key-dependent S-boxes. It
uses fixed S-boxes [Figure 3].
Blowfish’s key schedule starts by initializing the
P-array and S-boxes with values derived from the
hexadecimal digits of pi, which contain no obvious
pattern. The secret key is then XORed with the
P-entries in order (cycling the key if necessary).
A 64-bit all-zero block is then encrypted with the
algorithm as it stands. The resultant ciphertext
replaces P1 and P2. The ciphertext is then
encrypted again with the new subkeys, and P3
and P4 are replaced by the new ciphertext. This
continues replacing the entire P-array and all the
S-box entries. In all, the Blowfish encryption
algorithm will run 521 times to generate all the
subkeys - about 4 KB of data is processed.
a. Blowfish flowchart
b. Blowfish data encryption technique [Figures 4
and 5].
Blowfish uses 16 rounds. Each round consists of
key-dependent permutation and a key- and data-
dependent substitution. All operations are XORs
and additions on 32-bit words. The only additional
operations are four indexed array data lookup
tables for each round.
PROPOSED SYSTEM [FIGURE 6]
By selecting the cloud services, the users are able
to store their local data in the remote data server.
The data stored in remote data center can be
accessed or managed through the cloud services
provided by the cloud service providers. Hence,
the data stored in a remote data center for data
processing should be done with utmost care. To
achieve more security at the level of fog, the
proposed system introduces encryption to the data
using the Blowfish encryption standard algorithm
technique. The proposed system introduces
Blowfish algorithm in the fog environment, so
whenever user sends data to fog for storing data
in the cloud, the fog will encrypt the data and
send it to the cloud. When user requests data,
Figure 3: S-box structure
Usharani: Security in Fog by Blowfish
AJCSE/Jan-Mar-2018/Vol 3/Issue 1 25
Figure 4: Flowchart for Blowfish algorithm
the encrypted data travel from cloud to fog and
fog to end user, and the data will be decrypted at
end user. It is very difficult to hack the Blowfish
algorithm. The proposed system presents security
to the network or transmission data by Blowfish
algorithm in fog computing, which makes the data
of the end user more secured while the data are
traveling from cloud to fog or fog to cloud.
CONCLUSIONS
Conventional methods of encryption work on
letters, so their usage has been declined for
blocks. Blowfish algorithm is the replacement
of DES and IDEA algorithms in the cipher
techniques. The advantage of Blowfish is the
variable length of the key size, i.e., from 32
to 448 bits. Blowfish is accepted as a strong
encryption algorithm and fast cipher technique.
The strength of the Blowfish is the generation
of the subkeys, and it is very difficult to the
attacker because it is very complex to identify a
key, i.e., for each key generation, the encryption
routine runs 522 times. In this paper, Blowfish
is implemented in fog network for IoT devices.
An additional layer of security is added for data
retrieval; this makes the intruder very difficult to
hack the data.
Usharani: Security in Fog by Blowfish
AJCSE/Jan-Mar-2018/Vol 3/Issue 1 26
3. Bhadauria R, Sanyal S. A survey on security issues in
cloud computing and associated mitigation techniques.
Int J Comput Appl 2012;47:47-66.
4. Mohammed EM, Ambelkadar HS. Enhanced Data
Security Model on Cloud Computing, 8th
International
Conference on IEEE publication; 2012. p. 12-7.
5. Wang L, von Laszewski G, Kunze M, Tao J, Fu
C, He X, et al. Cloud computing: A perspective study,
new generation computing.Adv Distribut Inf Processing
2010;28:137-46.
6. Khairnar S, Borkar D. Fog computing: A new concept
to minimize the attacks and to provide security in
cloud computing environment. Int J Res Eng Technol
2014;3:124-7.
7. Stojmenovic SIT,Wen S.The Fog Computing Paradigm:
Scenarios and Security Issues. Vol. 02. Federated
Conference on Computer Science and Information
Systems, ACSIS; 2014.
8. Dhande NS. Fog computing: Review of privacy and
security issues. Int J Eng Res General Sci 2015;3:864-8.
9. Stolfo SJ, Salem MB, Keromytis AD. Fog computing:
Mitigating insider data theft attacks in the cloud” IEEE;
2014.
10. NagKS,BhuvaneswariHB,NuthanAC.Implementation
of Advanced Encryption Standard-192 Bit Using
Multiple Keys. Vol. 1, 7. Research and Technology in
the Coming Decades (CRT 2013), National Conference
on Challenges; 2013. p. 27-8.
11. Sumitra G. Comparative analysis of AES and DES
security algorithms. Int J Sci Res Publ 2013;3:1-5.
12. Singh S, Maakar SK, Kumar S. Enhancing the security
of DES algorithm using transposition cryptography
techniques. Int J Adv Res Comput Sci Soft Eng
2013;3:464-71.
13. Kruti RS, Gambhava B. New approach of data
encryption standard algorithm. Int J Soft Comput Eng
2012;2:322.
14. Karthik S, Muruganandam A. Data encryption and
decryption by using triple DES and performance analysis
of crypto system. Int J Sci Eng Res 2014;2:24-31.
15. Sachin M, Kumar D. Implementation and analysis of
AES, DES and triple DES on GSM Copyright. Int J
Comput Sci Netw Security 2010;10:298-303.
16. Singh G, Supriya. A study of encryption algorithms
(RSA, DES, 3DES and AES) for information security.
Int J Comput Appl 2013;67:33-8.
17. Jain R, Jejurkar R, Chopade S, Vaidya S, Sanap M.
AESalgorithm using 512 bit key implementation for
secure communication. Res J Appl Sci Eng Technol
2014;8:2116-20.
18. Saraf KR, Jagtap VP, Mishra AK. Text and image
encryption decryption using advanced encryption
standard. Int J Emerg Trends Technol Comput Sci
2014;3: 118-26.
19. AdvancedEncryptionAlgorithmanditsImplementation.
Available from: https://www.en.wikipedia.org/wiki/
Advanced_Encryption_Standard. [Last accessed on
2015 Jul 07].
Figure 5: Encryption procedure in Blowfish cipher
algorithm
Figure 6: System architecture
REFERENCES
1. Shen Z, Li L, Yan F, Wu X. Cloud Computing System
Based on Trusted Computing Platform, International
Conference on Intelligent Computation Technology and
Automation. Vol. 1; 2010. p. 942-5.
2. Pearson S, Benameur A. Privacy, Security and Trust
IssuesArises from Cloud Computing, Cloud Computing
Technology and Science (CloudCom), IEEE Second
International Conference; 2010. p. 693-702.
AQ4
Author Queries???
AQ4: Kindly cite references 1-19 in the text part

More Related Content

PDF
Secure Fog Computing System using Emoticon Technique
PDF
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
PDF
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
PDF
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
PDF
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
PDF
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
PDF
Fog computing
PDF
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
Secure Fog Computing System using Emoticon Technique
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Fog computing
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...

Similar to Fog and Internet of Things Network Security through Blowfish Cipher (20)

PPTX
semppt.pptx
PDF
Fog computing a new concept to minimize the attacks and to provide security i...
PDF
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
PDF
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
PDF
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
PDF
Science international journal
PDF
Fog computing security and privacy issues, open challenges, and blockchain so...
PPTX
Various security issues and its solutions in the
DOCX
Seminar report
PPTX
cloud security using Fog Computing
PDF
A Study on Cloud and Fog Computing Security Issues and Solutions
PPTX
FOG COMPUTING- Presentation
PDF
Fog Computing: Issues, Challenges and Future Directions
PDF
Security and Privacy Issues of Fog Computing: A Survey
PDF
Security and privacy issues of fog
PDF
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
PDF
Paper id 27201448
PDF
A survey of fog computing concepts applications and issues
PDF
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
PDF
FOG COMPUTING, what and why a fog computing
semppt.pptx
Fog computing a new concept to minimize the attacks and to provide security i...
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
Science international journal
Fog computing security and privacy issues, open challenges, and blockchain so...
Various security issues and its solutions in the
Seminar report
cloud security using Fog Computing
A Study on Cloud and Fog Computing Security Issues and Solutions
FOG COMPUTING- Presentation
Fog Computing: Issues, Challenges and Future Directions
Security and Privacy Issues of Fog Computing: A Survey
Security and privacy issues of fog
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Paper id 27201448
A survey of fog computing concepts applications and issues
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
FOG COMPUTING, what and why a fog computing
Ad

More from BRNSSPublicationHubI (20)

PDF
Investigation the Effect of Wet Granulation and Hydrophilic Binder in Dissolu...
PDF
Antimicrobial Activity of Green Tea: Honey Blend against Acne-Causing Microo...
PDF
Allergic Angina with QTc Prolongation and Wellens Type-A Syndrome Post-ceftr...
PDF
Polymer Synergy in Action: Antimicrobial Properties of Chitosan-Alginate Com...
PDF
Screening of polymerization effect with Alginate-HPMC-Guar gum on Polymer-Ba...
PDF
Formulation and Evaluation of Herbal Soap for Fairness and Glowing Skin
PDF
An Analytical Study to Ascertain the Safety of Dashmooli Kwath (Syrup)
PDF
An Analytical Study of Kushmanda avaleha to Evaluate its Safest Ayurvedic Pre...
PDF
Evaluation of the Antibacterial Activity of Methanolic Extracts of Hemigraphi...
PDF
Management of Polycystic Ovary Syndrome by Chinese Herbal Medicine Cinnamon a...
PDF
The Role of Air Pollution on Climate Change: Myths and Realities
PDF
Suggesting a Prescriptive Model for Online Agricultural Education
PDF
Multidimensional Poverty Status Correlates of Rural Households in Kaduna Stat...
PDF
Typology of Processed Tea (Camellia sinensis [L.] O. Kuntze): A Review
PDF
Sustainable Entrepreneurship of Farm Women through Duck Farming in Purba Bard...
PDF
A Comparative Study of Management Approaches for Khari Goats in Traditional V...
PDF
From Field to Kitchen: Pre-extension Demonstration of Sweet Potato Variety (H...
PDF
Characterization of Systematic Variations in Met Parameters: Impact of El Nin...
PDF
Mutual interactions and Inter-relationships between “Weather” and “Weather Sy...
PDF
The Relationship between the Food Nutritional Value and the Absence of Microb...
Investigation the Effect of Wet Granulation and Hydrophilic Binder in Dissolu...
Antimicrobial Activity of Green Tea: Honey Blend against Acne-Causing Microo...
Allergic Angina with QTc Prolongation and Wellens Type-A Syndrome Post-ceftr...
Polymer Synergy in Action: Antimicrobial Properties of Chitosan-Alginate Com...
Screening of polymerization effect with Alginate-HPMC-Guar gum on Polymer-Ba...
Formulation and Evaluation of Herbal Soap for Fairness and Glowing Skin
An Analytical Study to Ascertain the Safety of Dashmooli Kwath (Syrup)
An Analytical Study of Kushmanda avaleha to Evaluate its Safest Ayurvedic Pre...
Evaluation of the Antibacterial Activity of Methanolic Extracts of Hemigraphi...
Management of Polycystic Ovary Syndrome by Chinese Herbal Medicine Cinnamon a...
The Role of Air Pollution on Climate Change: Myths and Realities
Suggesting a Prescriptive Model for Online Agricultural Education
Multidimensional Poverty Status Correlates of Rural Households in Kaduna Stat...
Typology of Processed Tea (Camellia sinensis [L.] O. Kuntze): A Review
Sustainable Entrepreneurship of Farm Women through Duck Farming in Purba Bard...
A Comparative Study of Management Approaches for Khari Goats in Traditional V...
From Field to Kitchen: Pre-extension Demonstration of Sweet Potato Variety (H...
Characterization of Systematic Variations in Met Parameters: Impact of El Nin...
Mutual interactions and Inter-relationships between “Weather” and “Weather Sy...
The Relationship between the Food Nutritional Value and the Absence of Microb...
Ad

Recently uploaded (20)

PDF
01-Introduction-to-Information-Management.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Computing-Curriculum for Schools in Ghana
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Cell Types and Its function , kingdom of life
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
GDM (1) (1).pptx small presentation for students
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Lesson notes of climatology university.
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
01-Introduction-to-Information-Management.pdf
Classroom Observation Tools for Teachers
Computing-Curriculum for Schools in Ghana
2.FourierTransform-ShortQuestionswithAnswers.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pre independence Education in Inndia.pdf
Basic Mud Logging Guide for educational purpose
Cell Types and Its function , kingdom of life
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Anesthesia in Laparoscopic Surgery in India
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Microbial diseases, their pathogenesis and prophylaxis
GDM (1) (1).pptx small presentation for students
102 student loan defaulters named and shamed – Is someone you know on the list?
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Lesson notes of climatology university.
Supply Chain Operations Speaking Notes -ICLT Program
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
TR - Agricultural Crops Production NC III.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf

Fog and Internet of Things Network Security through Blowfish Cipher

  • 1. © 2018, AJCSE. All Rights Reserved 22 RESEARCH ARTICLE Fog and Internet of Things Network Security through Blowfish Cipher B. Usharani Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Green Fields, Guntur, Andhra Pradesh, India Received: 02-12-2017; Revised: 25-12-2017; Accepted: 20-01-2018 ABSTRACT The data are stored and accessed in a cloud from the remote server with the help of services provided by cloud service providers. Security is a major issue as the data are transmitted to the remote server through the internet. Encryption is a better solution to secure the information when storing data at remote servers. Fog computing is evolved to overcome the security issues in cloud. Still, there are some data security issues in fog computing. An encryption algorithm plays a key role in the cloud security. Network-based intrusion prevention system is used to detect threats in real time. To provide a secure data access in cloud, advanced encryption techniques can be used for storing and retrieving data from cloud. Furthermore, proper key management techniques can be used to distribute the key to the cloud users such that only authorized persons can access the data. The Blowfish encryption can never be hacked. In this paper, Blowfish cipher technique is implemented for the security to fog of internet of things network. Key words: Blowfish, cipher techniques, fog, internet of things, network security INTRODUCTION As the number of devices connected to internet increases, there would be definitely a problem in storage and information retrieval process. Fog computing has been introduced overcome the security issues in the cloud computing. Huge amount of data produced by internet of things (IoT) devices and storing data into cloud and retrieving is highly difficult. Hence, fog has been introduced. IoThad led evolution to the fog computing because of the increased number of devices producing massive amount of data. In cloud computing, there are many security issues as of man in the middle attack and even the encryption of data is not safe method for cloud. It does not identify the difference between user and attacker. It does not concentrate on the security of the data. Cloud provides various services for storing and accessing of the data in which the major problem is that failure to provide security for the data against attackers. It is not providing any level of assurance to the user about the security of the data. Hence, developing a more secure cloud is not enough because there would Address for correspondence: B. Usharani, E-mail: ushareddy.vja@gmail.com be continuous attacks happening on the cloud, and there are chances that the data would be leaked or it might be lost forever. Hence, fog computing came into existence which is considered to be the most secure form of data storage. Hence, in this, we are trying to achieve more security at the level of fog by introducing encryption to the data using the Blowfish encryption standard algorithm technique. The paper introduces Blowfish algorithm in the fog environment, so whenever user sends data to fog for storing in the cloud, the fog will encrypt the data and send it to the cloud. Moreover, whenever user requests for the data, the encrypted data travel from cloud to fog and fog to end user, and the data will be decrypted at end user. FOG COMPUTING [FIGURE 1] In cloud computing concept, all the data produced from the users will be directly stored into the cloud and then it is analyzed with massive warehouses with analytics going on it and then decisions are made to act on data, and eventually, notifications are pushed to act on those decisions. In fog computing, the users will be notified what are the actions that are needed to be taken on the data and then analytics are applied on the received data and Available Online at www.ajcse.info Asian Journal of Computer Science Engineering 2018;3(1):22-26 ISSN 2581 – 3781
  • 2. Usharani: Security in Fog by Blowfish AJCSE/Jan-Mar-2018/Vol 3/Issue 1 23 stored it into the cloud. Fog computing is said to be an extension of the cloud but not a replacement of it. As the number of the devices connected to the internet has been increasing at rapid speed, and even advancement in the IoT has led this number to increase drastically [Figure 2]. IoT devices interact with fog nodes only when they need to offload a processing or storage request. Any other interactions would not be considered as part of the fog environment as such communications would happen as part of the network. These fog nodes interact with each other when they need to effectively manage network resources or to manage network itself. They may even operate in distributed manner to perform a specific task. To secure communications in a fog computing environment, the following communications between these devices are to be secured: 1. Communications between constrained - IoT devices and fog nodes and 2. Communications between fog nodes. Usually, an IoT device can initiate communication with any of the fog nodes in the fog network requesting for a processing or storage requirement. RELATED WORK Alrawais et al. discussed the security and privacy challenges of fog computing in IoT environments. They discussed how to use fog computing to improve the security and privacy issues in IoT environments. In addition, Hong et al. evaluated the programming model for large scale and latency sensitive IoT applications exploiting the fog computing platform. They studied the model with a camera network and connected vehicle applications and showed the efficient role of fog computing in IoT. Al Faruque and Vatanparvar proposed a software-defined network based on vehicle ad hoc networking supported by fog computing. The proposed architecture solves many issues in vehicle ad hoc networks by rising the connectivity between vehicles, vehicle-to- infrastructure, and vehicle to base station while integrating fog computing to decrease latency and provide resource utility. Koo and Hur proposed a deduplication scheme for encrypted data. CIPHER TECHNIQUES The original message is called as the plain text. The coded message is known as ciphertext. The process of converting plain text to ciphertext is known as encryption or enciphering. Cryptographic algorithms and protocols are divided into four categories: 1. Symmetric encryption 2. Asymmetric encryption 3. Data integrity algorithms 4. Authentication protocols. Network and Internet security consists of measures to deter, prevent, detect, and correct security violations that involve the transmission of information. A logical information channel is established by defining the route through the internet from source to destination by the use of communication protocols such as transmission control protocol/internet protocol by the sender and receiver. Figure 1: Fog computing architecture Figure 2: An example for IOT based on fog computing
  • 3. Usharani: Security in Fog by Blowfish AJCSE/Jan-Mar-2018/Vol 3/Issue 1 24 Encryption key is used in conjunction with the transformation to scramble the message before transmission and unscramble it on receiver side. Symmetric encryption is a form of cryptosystem in which encryption and decryption are performed using the same key. Symmetric encryption transforms plain text into ciphertext using a secret key and encryption algorithm. E(K,X) (1) Symmetric encryption of plain text X using secret key K.E. is the encryption algorithm applied on the plain text and key to transform to a ciphertext. The process of converting ciphertext to plain text is known as decryption or deciphering. In the symmetric encryption, using the same key that is used for encryption and a decryption algorithm, the plain text is recovered from the ciphertext. D(K,Y) (2) Symmetric encryption of ciphertext Y using secret key K.D. is the decryption algorithm applied on the ciphertext and key to recover original message. With the message X and the encryption key as input, the encryption algorithm forms the ciphertext Y=(Y1 ,Y2 ,Y3 ,…….Yn ). Y=E(K,X) With the cipher message Y and the decryption key as input, the decryption algorithm forms the plain text X=D(K,Y) Security of an encryption scheme depends on the length of the key. BLOWFISH CIPHER TECHNIQUE Blowfish is an encryption algorithm that can be used as a replacement for the data encryption standard (DES) or International Data Encryption Algorithm (IDEA) algorithms. It is a symmetric or conventional block cipher that uses a variable- length key, from 32 bits to 448 bits. Blowfish uses a 64-bit block size and a key length of any size from 32 bits to 448 bits. It is a 16-round Feistel cipher and uses large key-dependent S-boxes. It uses fixed S-boxes [Figure 3]. Blowfish’s key schedule starts by initializing the P-array and S-boxes with values derived from the hexadecimal digits of pi, which contain no obvious pattern. The secret key is then XORed with the P-entries in order (cycling the key if necessary). A 64-bit all-zero block is then encrypted with the algorithm as it stands. The resultant ciphertext replaces P1 and P2. The ciphertext is then encrypted again with the new subkeys, and P3 and P4 are replaced by the new ciphertext. This continues replacing the entire P-array and all the S-box entries. In all, the Blowfish encryption algorithm will run 521 times to generate all the subkeys - about 4 KB of data is processed. a. Blowfish flowchart b. Blowfish data encryption technique [Figures 4 and 5]. Blowfish uses 16 rounds. Each round consists of key-dependent permutation and a key- and data- dependent substitution. All operations are XORs and additions on 32-bit words. The only additional operations are four indexed array data lookup tables for each round. PROPOSED SYSTEM [FIGURE 6] By selecting the cloud services, the users are able to store their local data in the remote data server. The data stored in remote data center can be accessed or managed through the cloud services provided by the cloud service providers. Hence, the data stored in a remote data center for data processing should be done with utmost care. To achieve more security at the level of fog, the proposed system introduces encryption to the data using the Blowfish encryption standard algorithm technique. The proposed system introduces Blowfish algorithm in the fog environment, so whenever user sends data to fog for storing data in the cloud, the fog will encrypt the data and send it to the cloud. When user requests data, Figure 3: S-box structure
  • 4. Usharani: Security in Fog by Blowfish AJCSE/Jan-Mar-2018/Vol 3/Issue 1 25 Figure 4: Flowchart for Blowfish algorithm the encrypted data travel from cloud to fog and fog to end user, and the data will be decrypted at end user. It is very difficult to hack the Blowfish algorithm. The proposed system presents security to the network or transmission data by Blowfish algorithm in fog computing, which makes the data of the end user more secured while the data are traveling from cloud to fog or fog to cloud. CONCLUSIONS Conventional methods of encryption work on letters, so their usage has been declined for blocks. Blowfish algorithm is the replacement of DES and IDEA algorithms in the cipher techniques. The advantage of Blowfish is the variable length of the key size, i.e., from 32 to 448 bits. Blowfish is accepted as a strong encryption algorithm and fast cipher technique. The strength of the Blowfish is the generation of the subkeys, and it is very difficult to the attacker because it is very complex to identify a key, i.e., for each key generation, the encryption routine runs 522 times. In this paper, Blowfish is implemented in fog network for IoT devices. An additional layer of security is added for data retrieval; this makes the intruder very difficult to hack the data.
  • 5. Usharani: Security in Fog by Blowfish AJCSE/Jan-Mar-2018/Vol 3/Issue 1 26 3. Bhadauria R, Sanyal S. A survey on security issues in cloud computing and associated mitigation techniques. Int J Comput Appl 2012;47:47-66. 4. Mohammed EM, Ambelkadar HS. Enhanced Data Security Model on Cloud Computing, 8th International Conference on IEEE publication; 2012. p. 12-7. 5. Wang L, von Laszewski G, Kunze M, Tao J, Fu C, He X, et al. Cloud computing: A perspective study, new generation computing.Adv Distribut Inf Processing 2010;28:137-46. 6. Khairnar S, Borkar D. Fog computing: A new concept to minimize the attacks and to provide security in cloud computing environment. Int J Res Eng Technol 2014;3:124-7. 7. Stojmenovic SIT,Wen S.The Fog Computing Paradigm: Scenarios and Security Issues. Vol. 02. Federated Conference on Computer Science and Information Systems, ACSIS; 2014. 8. Dhande NS. Fog computing: Review of privacy and security issues. Int J Eng Res General Sci 2015;3:864-8. 9. Stolfo SJ, Salem MB, Keromytis AD. Fog computing: Mitigating insider data theft attacks in the cloud” IEEE; 2014. 10. NagKS,BhuvaneswariHB,NuthanAC.Implementation of Advanced Encryption Standard-192 Bit Using Multiple Keys. Vol. 1, 7. Research and Technology in the Coming Decades (CRT 2013), National Conference on Challenges; 2013. p. 27-8. 11. Sumitra G. Comparative analysis of AES and DES security algorithms. Int J Sci Res Publ 2013;3:1-5. 12. Singh S, Maakar SK, Kumar S. Enhancing the security of DES algorithm using transposition cryptography techniques. Int J Adv Res Comput Sci Soft Eng 2013;3:464-71. 13. Kruti RS, Gambhava B. New approach of data encryption standard algorithm. Int J Soft Comput Eng 2012;2:322. 14. Karthik S, Muruganandam A. Data encryption and decryption by using triple DES and performance analysis of crypto system. Int J Sci Eng Res 2014;2:24-31. 15. Sachin M, Kumar D. Implementation and analysis of AES, DES and triple DES on GSM Copyright. Int J Comput Sci Netw Security 2010;10:298-303. 16. Singh G, Supriya. A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 2013;67:33-8. 17. Jain R, Jejurkar R, Chopade S, Vaidya S, Sanap M. AESalgorithm using 512 bit key implementation for secure communication. Res J Appl Sci Eng Technol 2014;8:2116-20. 18. Saraf KR, Jagtap VP, Mishra AK. Text and image encryption decryption using advanced encryption standard. Int J Emerg Trends Technol Comput Sci 2014;3: 118-26. 19. AdvancedEncryptionAlgorithmanditsImplementation. Available from: https://www.en.wikipedia.org/wiki/ Advanced_Encryption_Standard. [Last accessed on 2015 Jul 07]. Figure 5: Encryption procedure in Blowfish cipher algorithm Figure 6: System architecture REFERENCES 1. Shen Z, Li L, Yan F, Wu X. Cloud Computing System Based on Trusted Computing Platform, International Conference on Intelligent Computation Technology and Automation. Vol. 1; 2010. p. 942-5. 2. Pearson S, Benameur A. Privacy, Security and Trust IssuesArises from Cloud Computing, Cloud Computing Technology and Science (CloudCom), IEEE Second International Conference; 2010. p. 693-702. AQ4 Author Queries??? AQ4: Kindly cite references 1-19 in the text part