FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain

被引:40
作者
Patwary, Abdullah Al-Noman [1 ]
Fu, Anmin [1 ]
Battula, Sudheer Kumar [2 ]
Naha, Ranesh Kumar [2 ]
Garg, Saurabh [2 ]
Mahanti, Aniket [3 ,4 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Peoples R China
[2] Univ Tasmania, Sch Technol Environm & Design TED, Hobart, Tas, Australia
[3] Univ Auckland, Sch Comp Sci, Auckland, New Zealand
[4] Univ New Brunswick, St John, NB, Canada
关键词
Fog computing; Security and privacy; Authentication; Device-to-Device communication; Blockchain; Digital identity; Location management; SMART CARD; PRIVACY; ARCHITECTURE; ISSUES;
D O I
10.1016/j.comcom.2020.08.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is an emerging computing paradigm which expands cloud-based computing services near the network edge. With this new computing paradigm, new challenges arise in terms of security and privacy. These concerns are due to the distributed ownership of Fog devices. Because of the large scale distributed nature of devices at the Fog layer, secure authentication for communication among these devices is a major challenge. The traditional authentication methods (password-based, certificate-based and biometric-based) are not directly applicable due to the unique architecture and characteristics of the Fog. Moreover, the traditional authentication methods consume significantly more computation power and incur high latency, and this does not meet the key requirements of the Fog. To fill this gap, this article proposes a secure decentralised location-based device to device (D2D) authentication model in which Fog devices can mutually authenticate each other at the Fog layer by using Blockchain. We considered an Ethereum Blockchain platform for the Fog device registration, authentication, attestation and data storage. We presented the overall system architecture, various participants and their transactions and message interaction between the participants. We validated the proposed model by comparing it with the existing method; results showed that the proposed authentication mechanism was efficient and secure. From the performance evaluation, it was found that the proposed method is computationally efficient and secure in a highly distributed Fog network.
引用
收藏
页码:212 / 224
页数:13
相关论文
共 45 条
  • [1] Almadhoun R, 2018, I C COMP SYST APPLIC
  • [2] Alonso A, 2017, FUTURE INTERNET, V9, DOI 10.3390/fi9040064
  • [3] [Anonymous], 2005, BIOM SYST, DOI DOI 10.1007/1-84628-064-8_1
  • [4] [Anonymous], 2008, INT J NETW SECUR
  • [5] [Anonymous], 2019, IEEE T SERV COMPUT, DOI DOI 10.3390/S19132954
  • [6] [Anonymous], 2010, INT J NETW SECUR
  • [7] [Anonymous], 2009, Int J Netw Secur
  • [8] Baars D., 2016, THESIS U TWENTE NETH
  • [9] A Micro-Level Compensation-Based Cost Model for Resource Allocation in a Fog Environment
    Battula, Sudheer Kumar
    Garg, Saurabh
    Naha, Ranesh Kumar
    Thulasiraman, Parimala
    Thulasiram, Ruppa
    [J]. SENSORS, 2019, 19 (13)
  • [10] A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment
    Ben Amor, Arij
    Abid, Mohamed
    Meddeb, Aref
    [J]. 2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1225 - 1231