FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain

被引:40
作者
Patwary, Abdullah Al-Noman [1 ]
Fu, Anmin [1 ]
Battula, Sudheer Kumar [2 ]
Naha, Ranesh Kumar [2 ]
Garg, Saurabh [2 ]
Mahanti, Aniket [3 ,4 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Peoples R China
[2] Univ Tasmania, Sch Technol Environm & Design TED, Hobart, Tas, Australia
[3] Univ Auckland, Sch Comp Sci, Auckland, New Zealand
[4] Univ New Brunswick, St John, NB, Canada
关键词
Fog computing; Security and privacy; Authentication; Device-to-Device communication; Blockchain; Digital identity; Location management; SMART CARD; PRIVACY; ARCHITECTURE; ISSUES;
D O I
10.1016/j.comcom.2020.08.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is an emerging computing paradigm which expands cloud-based computing services near the network edge. With this new computing paradigm, new challenges arise in terms of security and privacy. These concerns are due to the distributed ownership of Fog devices. Because of the large scale distributed nature of devices at the Fog layer, secure authentication for communication among these devices is a major challenge. The traditional authentication methods (password-based, certificate-based and biometric-based) are not directly applicable due to the unique architecture and characteristics of the Fog. Moreover, the traditional authentication methods consume significantly more computation power and incur high latency, and this does not meet the key requirements of the Fog. To fill this gap, this article proposes a secure decentralised location-based device to device (D2D) authentication model in which Fog devices can mutually authenticate each other at the Fog layer by using Blockchain. We considered an Ethereum Blockchain platform for the Fog device registration, authentication, attestation and data storage. We presented the overall system architecture, various participants and their transactions and message interaction between the participants. We validated the proposed model by comparing it with the existing method; results showed that the proposed authentication mechanism was efficient and secure. From the performance evaluation, it was found that the proposed method is computationally efficient and secure in a highly distributed Fog network.
引用
收藏
页码:212 / 224
页数:13
相关论文
共 45 条
  • [21] Survey on fog computing: architecture, key technologies, applications and open issues
    Hu, Pengfei
    Dhelim, Sahraoui
    Ning, Huansheng
    Qiu, Tie
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 98 : 27 - 42
  • [22] Hummen R., 2013, Proc. 2nd ACM Work. Hot Top. Wirel. Netw. Secur. Priv. - HotWiSec, V13, P37, DOI DOI 10.1145/2463183.2463193
  • [23] Ibrahim Maged Ramada, 2016, International Journal of Network Security, V18, P1089
  • [24] MASFOG: An Efficient Mutual Authentication Scheme For Fog Computing Architecture
    Imine, Youcef
    Kouicem, Djamel-eddine
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 608 - 613
  • [25] Kahvazadeh S., 2018, 3 CLOUD INT THINGS C, P1
  • [26] ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms
    Kuang, Boyu
    Fu, Anmin
    Yu, Shui
    Yang, Guomin
    Su, Mang
    Zhang, Yuqing
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 8372 - 8383
  • [27] An enhanced smart card based remote user password authentication scheme
    Li, Xiong
    Niu, Jianwei
    Khan, Muhammad Khurram
    Liao, Junguo
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (05) : 1365 - 1371
  • [28] A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
    Li, Xiong
    Ma, Jian
    Wang, Wendong
    Xiong, Yongping
    Zhang, Junsong
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 85 - 95
  • [29] Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
    Li, Xiong
    Niu, Jian-Wei
    Ma, Jian
    Wang, Wen-Dong
    Liu, Cheng-Lian
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) : 73 - 79
  • [30] Li Z, 2009, MODELLING SIMULATION, P156