Abstrakt: |
Blockchain technology ensures the integrity and transparency of data access control by keeping an unchangeable record of all transactions. Fog computing increases efficiency by dispersing cloud computing skills throughout the network's superiority and reducing latency in data access and authentication processes. The objective of this study is to develop a blockchain and fog computing model that implements secure data access control mechanisms for distributed data storage and authentication using a hybrid encryption algorithm. The model aims to provide secure and reliable data storage by leveraging the decentralized nature of blockchain and the proximity of fog computing to the data source. Additionally, the Hybrid Encryption Algorithm (HEA) enhances data security by combining multiple encryption techniques for robust protection against unauthorized access. This study proposes a novel blockchain and also the Fog Computing Model (FCM) that ensures secure data access control, distributed data storage, and authentication. The model utilizes a HEA and is based on the Deep Adaptive Power Probabilistic Clustering Algorithm for optimal cluster head selection. Probability clustering algorithms are employed to determine the prospect of attracting a cluster head. Elliptic Curve Diffie-Hellman (ECDH) and Secure Hashing Algorithm 512 (SHA-512) are utilized for secure key exchange and hashing, respectively. Additional features include bit addition, long message redemption value, initialization of hash value, and the integration of Ethereum Smart Contracts (SC) for trusted distributed cross-domain operations. The study investigates the performance of the proposal for cloud-fog computing networks via simulation analysis using Matlab software. This model aims to provide a comprehensive and robust framework for secure and efficient data management in distributed environments. In this context, reliability pertains to the level of assurance and trustworthiness of the data access control mechanisms and authentication processes integrated into the model. The proposed method demonstrates a high-reliability score of 95%, indicating its capability to provide secure and dependable data access and authentication procedures. This model offers a safeguarding distributed data storage, controlling access, and ensuring authentication using a combination of blockchain, fog computing, and HEAs respectively. [ABSTRACT FROM AUTHOR] |