Design of secure key management and user authentication scheme for fog computing services

被引:159
作者
Wazid, Mohammad [1 ]
Das, Ashok Kumar [2 ]
Kumar, Neeraj [3 ]
Vasilakos, Athanasios V. [4 ]
机构
[1] Innopolis Univ, Cyber Secur & Networks Lab, Innopolis, Russia
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[3] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[4] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, S-97187 Lulea, Sweden
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 91卷 / 475-492期
关键词
Fog computing; Key management; Authentication; Services; Security; AVISPA; NS2; simulation; AGREEMENT SCHEME; ENCRYPTION SCHEME; CLOUD; PRIVACY; EFFICIENT; PROTOCOL; ARCHITECTURE; BIOMETRICS; SCENARIOS; EXCHANGE;
D O I
10.1016/j.future.2018.09.017
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fog computing (fog networking) is known as a decentralized computing infrastructure in which data, applications, compute as well as data storage are scattered in the most logical and efficient place among the data source (i.e., smart devices) and the cloud. It gives better services than cloud computing because it has better performance with reasonably low cost. Since the cloud computing has security and privacy issues, and fog computing is an extension of cloud computing, it is therefore obvious that fog computing will inherit those security and privacy issues from cloud computing. In this paper, we design a new secure key management and user authentication scheme for fog computing environment, called SAKA-FC. SAKA-FC is efficient as it only uses the lightweight operations, such as one-way cryptographic hash function and bitwise exclusive-OR (XOR), for the smart devices as they are resource-constrained in nature. SAKA-FC is shown to be secure with the help of the formal security analysis using the broadly accepted Real Or -Random (ROR) model, the formal security verification using the widely-used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and also the informal security analysis. In addition, SAKA-FC is implemented for practical demonstration using the widely-used NS2 simulator. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:475 / 492
页数:18
相关论文
共 51 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] Biometric Security Through Visual Encryption for Fog Edge Computing
    Abdul, Wadood
    Ali, Zulfiqar
    Ghouzali, Sanaa
    Alfawaz, Budour
    Muhammad, Ghulam
    Hossain, M. Shamim
    [J]. IEEE ACCESS, 2017, 5 : 5531 - 5538
  • [3] An Attribute-Based Encryption Scheme to Secure Fog Communications
    Alrawais, Arwa
    Alhothaily, Abdulrahman
    Hu, Chunqiang
    Xing, Xiaoshuang
    Cheng, Xiuzhen
    [J]. IEEE ACCESS, 2017, 5 : 9131 - 9138
  • [4] Fog Computing for the Internet of Things: Security and Privacy Issues
    Alrawais, Arwa
    Alhothaily, Abdulrahman
    Hu, Chunqiang
    Cheng, Xiuzhen
    [J]. IEEE INTERNET COMPUTING, 2017, 21 (02) : 34 - 42
  • [5] [Anonymous], 2005, ACM T INFORM SYST SE, DOI DOI 10.1145/1053283.1053287
  • [6] AVISPA. SPAN, SEC PROT AN AVISPA
  • [7] Blundo C., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P471
  • [8] Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
  • [9] Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
  • [10] Provably secure three-factor authentication and key agreement scheme for session initiation protocol
    Challa, Sravani
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Wu, Fan
    Li, Xiong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5412 - 5431