Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks

Sejal Gupta, Ritu Garg, Nitin Gupta, Waleed S. Alnumay, Uttam Ghosh, Pradip Kumar Sharma*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

29 Citations (Scopus)


Recently, there is an exponential increase in the multimedia and other data over the Internet of Things (IoT). This data is generally send to the cloud for processing and storage. The fog layer in-between readily bridges communication among the IoT devices and the cloud. It delivers services efficiently by computing and analyzing various multimedia information generated by the IoT devices residing on the sensors. However, provision of effective security and energy are critical challenges. The purpose of this work is to enhance the secure transfer of information like multimedia. This scheme uses Message Queue Telemetry Transport (MQTT) protocol over SSL/TLS. Since MQTT is vulnerable to eavesdropping, the Elliptic curve-ElGamal cryptography algorithm is introduced which lends a homomorphic factor thereby mitigating man-in-the-middle attack. The dynamic key change and proportional offloading of data as proposed in the current research work helps to preserve node energy by selectively transferring data to the cloud and the fog according to the data topic. The results depict that the system security and lifetime can be improved in comparison to the existing protocols.

Original languageEnglish
Article number102768
Number of pages8
JournalJournal of Information Security and Applications
Early online date13 Feb 2021
Publication statusPublished - 1 May 2021

Bibliographical note

Funding Information:
The work is funded by Researchers Supporting Project grant number ( RSP-2020/250 ), King Saud University, Riyadh, Saudi Arabia .


  • Dynamic key change
  • Elliptic-Curve cryptography (ECC)
  • Fog computing
  • Homomorphic encryption
  • Internet of Things (IoT)
  • Man-in-the-middle (MITM) attack
  • MQTT
  • Security and privacy


Dive into the research topics of 'Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks'. Together they form a unique fingerprint.

Cite this