FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain

被引:40
|
作者
Patwary, Abdullah Al-Noman [1 ]
Fu, Anmin [1 ]
Battula, Sudheer Kumar [2 ]
Naha, Ranesh Kumar [2 ]
Garg, Saurabh [2 ]
Mahanti, Aniket [3 ,4 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Peoples R China
[2] Univ Tasmania, Sch Technol Environm & Design TED, Hobart, Tas, Australia
[3] Univ Auckland, Sch Comp Sci, Auckland, New Zealand
[4] Univ New Brunswick, St John, NB, Canada
关键词
Fog computing; Security and privacy; Authentication; Device-to-Device communication; Blockchain; Digital identity; Location management; SMART CARD; PRIVACY; ARCHITECTURE; ISSUES;
D O I
10.1016/j.comcom.2020.08.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is an emerging computing paradigm which expands cloud-based computing services near the network edge. With this new computing paradigm, new challenges arise in terms of security and privacy. These concerns are due to the distributed ownership of Fog devices. Because of the large scale distributed nature of devices at the Fog layer, secure authentication for communication among these devices is a major challenge. The traditional authentication methods (password-based, certificate-based and biometric-based) are not directly applicable due to the unique architecture and characteristics of the Fog. Moreover, the traditional authentication methods consume significantly more computation power and incur high latency, and this does not meet the key requirements of the Fog. To fill this gap, this article proposes a secure decentralised location-based device to device (D2D) authentication model in which Fog devices can mutually authenticate each other at the Fog layer by using Blockchain. We considered an Ethereum Blockchain platform for the Fog device registration, authentication, attestation and data storage. We presented the overall system architecture, various participants and their transactions and message interaction between the participants. We validated the proposed model by comparing it with the existing method; results showed that the proposed authentication mechanism was efficient and secure. From the performance evaluation, it was found that the proposed method is computationally efficient and secure in a highly distributed Fog network.
引用
收藏
页码:212 / 224
页数:13
相关论文
共 50 条
  • [31] Anonymous-authentication scheme based on fog computing for VANET
    Han, Mu
    Liu, Shuai
    Ma, Shidian
    Wan, Ailan
    PLOS ONE, 2020, 15 (02):
  • [32] A Blockchain-Based Location Privacy-Preserving Scheme in Location-Based Service
    Xudong, Yang
    Ling, Gao
    Yan, Li
    Hairong, Zhu
    Quanli, Gao
    Jie, Zheng
    Hai, Wang
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [33] Secure authentication scheme with Archimedes optimization algorithm for load balancing technique in fog computing
    Premkumar N.
    Santhosh R.
    International Journal of Information Technology, 2024, 16 (6) : 3861 - 3869
  • [34] A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment
    Dewanta, Favian
    Mambo, Masahiro
    IEEE ACCESS, 2019, 7 : 103095 - 103114
  • [35] Enhancing Security Using Secure Authentication Model in Fog Computing Model
    Kavuri K. S. V. A. Satheesh
    T. Krishna Sree
    Wireless Personal Communications, 2023, 130 : 909 - 933
  • [36] SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing
    Kaliya, Neha
    Pawar, Digambar
    Sriram, Thota
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT I, 2024, 2090 : 349 - 365
  • [37] Enhancing Security Using Secure Authentication Model in Fog Computing Model
    Satheesh, Kavuri K. S. V. A.
    Sree, T. Krishna
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (02) : 909 - 933
  • [38] HAFC: Handover Authentication Scheme Based on Fog Computing for 5G-Assisted Vehicular Blockchain Networks
    Mohammed, Badiea Abdulkarem
    Al-Shareeda, Mahmood A.
    Al-Mekhlafi, Zeyad Ghaleb
    Alshudukhi, Jalawi Sulaiman
    Al-Dhlan, Kawther A.
    IEEE ACCESS, 2024, 12 : 6251 - 6261
  • [39] Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication
    Al-Mekhlafi, Zeyad Ghaleb
    Al-Janabi, Hussam Dheaa Kamel
    Al-Shareeda, Mahmood A.
    Mohammed, Badiea Abdulkarem
    Alshudukhi, Jalawi Sulaiman
    Al-Dhlan, Kawther A.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (06) : 3703 - 3721
  • [40] Fog computing framework for location-based energy management in smart buildings
    Maatoug, Abdelfettah
    Belalem, Ghalem
    Mahmoudi, Said
    MULTIAGENT AND GRID SYSTEMS, 2019, 15 (01) : 39 - 56