A Dynamic Scalable Security Model for Data at Rest in fog Computing Environment
Tarek Husein1, Aqeel Khalique2, M. Afshar Alam3, Bhavya Alankar4

1Tarek Husein*, Department of Computer Science& Engineering, Jamia Hamdard, Delhi, India.
2Aqeel Khalique*, Department of Computer Science& Engineering, Jamia Hamdard, Delhi, India.
3M. Afshar Alam, Department of Computer Science& Engineering, Jamia Hamdard, Delhi, India.
4Bhavya Alankar, Department of Computer Science& Engineering, Jamia Hamdard, Delhi, India.
Manuscript received on August 20, 2020. | Revised Manuscript received on September 04, 2020. | Manuscript published on September 10, 2020. | PP: 413-418 | Volume-9 Issue-11, September 2020 | Retrieval Number: 100.1/ijitee.J73100891020 | DOI: 10.35940/ijitee.J7310.0991120
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Fog computing brings cloud services closer to the network’s Edge. Despite various applications in today’s world, these applications lack in data security aspects. Developers have few solutions that need to be tested thoroughly. Data encipherment is one of the most popular mechanisms to protect data confidentiality, data integrity, etc. We propose two steps flexible dynamic scalable model in which the system will dynamically choose an encryption mechanism depending on the access frequency of data being encrypted. If data is frequently accessed, then the model will choose the algorithm with minimum computational complexity. In next step, model will use a scalable approach to decide the security strength needed by determining size of encryption key. A longer key will be used to encrypt more sensitive and secretive data automatically by security model and a smaller key will be used to encrypt public data or less sensitive, saving the fog node from computation overload. Our model is more secure and dynamic in nature with scalable security strength. 
Keywords: Data Encryption, Scalable Security, Information Security, Fog Security.
Scope of the Article: Information-Centric Networking