Visual Cryptography based Authentication of Fog Devices

Main Article Content

Mradula Sharma
Parmeet Kaur

Abstract

Visual cryptography (VC) is a method of distributing secret images in the form of shares to different users. Each share displays either random noise or a random binary pattern. A secret image is visible only when all shares are stacked together. The paper proposes a cloud-fog architecture in which the cloud server uses VC technique to authenticate the Fog devices trying to connect with it. A secret code is generated by the cloud server and divided into two shares, one of which is shared with the fog device. When a fog device connects to a cloud server, it sends the shared image to the cloud. The cloud then stacks the received share image with its own share image. If the secret image is shown, the fog device is verified and can transfer data or communicate with the cloud server. Further, the proposed architecture uses K out of N visual cryptography to authenticate the group of Fog devices, where K shares out of N are required to reveal the secret image.

Article Details

How to Cite
1.
Sharma M, Parmeet Kaur. Visual Cryptography based Authentication of Fog Devices . J. Int. Acad. Phys. Sci. [Internet]. 2023 Jun. 15 [cited 2024 May 4];27(2):99-108. Available from: https://www.iaps.org.in/journal/index.php/journaliaps/article/view/854
Section
Articles

References

Kim, Hokeun, and Edward A. Lee; Authentication and Authorization for the Internet of Things, IT Professional 19(5) (2017), 27-33.

Woo, Y C Thomas and Simon S. Lam; Authentication for distributed systems, Computer 25(1) (1992), 39-52.

Hunkeler, Urs, Hong Linh Truong and Andy Stanford-Clark; MQTT-S- A publish/subscribe protocol for Wireless Sensor Networks, 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE'08), IEEE, (2008), 791-798.

M. S. Pardeshi and S. -M. Yuan; SMAP Fog/Edge: A Secure Mutual Authentication Protocol for Fog/Edge, IEEE Access, 7 (2019), 101327-101335.

Naor, Moni, and Adi Shamir; Visual cryptography, In Workshop on the Theory and Application of of Cryptographic Techniques, Springer, Berlin, Heidelberg, (1994), 1-12.

Lou, Der-Chyuan, Hao-Kuan Tso and Jiang-Lung Liu; A copyright protection scheme for digital images using visual cryptography technique, Computer Standards & Interfaces, 29(1) (2007), 125-131.

Chen, Yi-Hui, Chi-Shiang Chan, Po-Yu Hsu and Wei-Lin Huang, Tagged visual cryptography with access control, IEEE International Conference on Multimedia and Expo Workshops (ICMEW), (2014), 1-5.

Stelvio Cimato, James CN Yang and Chih-Cheng Wu, Visual cryptography based watermarking, Transactions on Data Hiding and Multimedia Security IX: Special Issue on Visual Cryptography (2014), 91-109.

Sain, Kunal, Mradula Sharma and Suneeta Agarwal; ASPS: an authentication scheme using pre-formed visual cryptographic shares, Proceedings of the Fifth International Conference on Security of Information and Networks, (2012), 183-187.

C. Blundo, A. D. Santis and M. Naor; Visual cryptography for grey level images, Information Processing Letters, 75(6) (2000), 255-259.

C.-C. Lin and W.-H. Tsai; Visual cryptography for gray-level images by dithering techniques, Pattern Recognition Letters, 24(13) (2003), 349-358.

Y.-C. Hou; Visual cryptography for color images, Pattern Recognition, 36(7) (2003), 1619-1629.

Stojmenovic, Ivan, Sheng Wen, Xinyi Huang and Hao Luan; An overview of fog computing and its security issues, Concurrency and Computation: Practice and Experience, 28(10) (2016), 2991-3005.

Mradula Sharma, Kunal Sain and Suneeta Agarwal; GES: A Group based Encoding of Shares for Visual Cryptography without Pixel Expansion, International Journal of Computer Applications 975 (2014), 8887.