ABSTRACT

The role of block chain in fog computing is an increasing concern in security management. The purpose of the study is to analyze the roles of key management techniques and fog computing cross-platform support for several block chain framework operating systems. This chapter presents the cipher key management in block chain based fog computing between user file and encrypted key. The use of a meta key model has been analyzed by the attack of collusion and proxy encryption development. The encrypted data shares the compatible protocols for block chain key management. For authentication of information, hashing techniques have been applied to complete nodes in the structure. This approach gives secure shared data in the distrusted environment by the integration of block chain based fog computing looking towards successful integration.