Secure and novel authentication model for protecting data centers in fog environment

被引:2
作者
Senthil Mahesh, P. C. [1 ]
Muthumanickam, K. [2 ]
机构
[1] Excel Engn Coll, Dept Comp Sci & Engn, Namakkal, Tamilnadu, India
[2] Kongunadu Coll Engn & Technol Autonomous, Dept Informat Technol, ThollurPatti, Tamilnadu, India
关键词
Fog; Edge computing; Authentication; Cloud; Data center; Security; SCHEME; CLOUD; POWER; EDGE;
D O I
10.1007/s11276-022-03220-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The model of the fog environment for real-time applications has recently become a research area of intense interest as it offers cloud services instantly to users. Fog computing also resolves several important and challenging issues related to the cloud computing model, including latency issues. Despite these added services, however, the fog networking infrastructure is still based on an emerging standard that requires further research. Since an edge data Center is typically placed in a remote location, the requirements for protecting it through authentication mechanism have become a major focus. Most current solutions have addressed the optimization of load balancing, which is an important issue, but have failed to resolve several other challenging problems. Among the other prevalent issues in fog computing, security has become the most important and complex issue. This paper aims to address and resolve the question of security by recommending a lightweight, strong authentication scheme that ensures safe communication between edge data centers. The proposed security scheme is carefully assessed, and ensured that its computation cost is low compared with other exisitng solutions. The suggested scheme improves the security of the entire fog network by only permitting legitimate edge data centers while performing vital cloud computing services and is a suitable option for resource-constrained computational devices.
引用
收藏
页码:1671 / 1683
页数:13
相关论文
共 33 条
  • [1] Detecting Man-in-the-Middle Attack in Fog Computing for Social Media
    Aliyu, Farouq
    Sheltami, Tarek
    Mahmoud, Ashraf
    Al-Awami, Louai
    Yasar, Ansar
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1159 - 1181
  • [2] [Anonymous], 2011, SCYTHER
  • [3] Toward Fog-Based Mobile Crowdsensing Systems: State of the Art and Opportunities
    Belli, Dimitri
    Chessa, Stefano
    Kantarci, Burak
    Foschini, Luca
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (12) : 78 - 83
  • [4] Edge of Things: The Big Picture on the integration of Edge, IoT and the Cloud in a Distributed Computing Environment
    El-Sayed, Hesham
    Sankar, Sharmi
    Prasad, Mukesh
    Puthal, Deepak
    Gupta, Akshansh
    Mohanty, Manoranjan
    Lin, Chin-Teng
    [J]. IEEE ACCESS, 2018, 6 : 1706 - 1717
  • [5] MASFOG: An Efficient Mutual Authentication Scheme For Fog Computing Architecture
    Imine, Youcef
    Kouicem, Djamel-eddine
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 608 - 613
  • [6] Fog Computing Applications in Smart Cities: A Systematic Survey
    Javadzadeh, Ghazaleh
    Rahmani, Amir Masoud
    [J]. WIRELESS NETWORKS, 2020, 26 (02) : 1433 - 1457
  • [7] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [8] Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 720 - 729
  • [9] Security Issues in Fog Environment: A Systematic Literature Review
    Kaur, Jasleen
    Agrawal, Alka
    Khan, Raees Ahmad
    [J]. INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (03) : 467 - 483
  • [10] A fog-based security framework for intelligent traffic light control system
    Khalid, Tauqeer
    Khan, Abdul Nasir
    Ali, Mazhar
    Adeel, Adil
    Khan, Atta ur Rehman
    Shuja, Junaid
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (17) : 24595 - 24615