A Secure Mutual authentication approach to fog computing environment

被引:25
作者
Kalaria, Rudri [1 ]
Kayes, A. S. M. [2 ]
Rahayu, Wenny [1 ,3 ]
Pardede, Eric [1 ]
机构
[1] La Trobe Univ, Dept Comp Sci & Informat Technol, Melbourne, Vic, Australia
[2] La Trobe Univ, Dept Comp Sci & Informat Technol, Bachelor Cyber Secur, Melbourne, Vic, Australia
[3] La Trobe Univ, Sch Engn & Math Sci, Melbourne, Vic, Australia
关键词
Mutual authentication approach; Fog computing; Cloud computing; End devices; Fog server; Lightweight; Low-Complexity; Elliptic curve cryptography; Cyber attacks; PRIVACY; INTERNET; SCHEME; THINGS;
D O I
10.1016/j.cose.2021.102483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is a new emerging technology that complements the cloud and extends the services of cloud computing to be doser to the end devices. The cloud is usually located far from the devices which use their services and some of the recent research suggests that using a fog server as a nearby lightweight middleware can bridge the gap and provides rich resources doser to the end devices. Security is a crucial factor for the appropriate function-ing of fog computing. In particular, authentication and key exchange are significant chal-lenges which need to be taken into consideration in fog computing. Ensuring secure mutual authentication is very important for the security of fog computing since fog servers provide services to number of end users. However, the existing mutual authentication schemes are either having large computational overheads or are not able to achieve secure mutual au-thentication. In this paper, we propose a fog-based mutual authentication scheme using low-cost primitives such as Elliptic Curve Cryptography (ECC) and one-way hash functions. We also present the formal security analysis of our authentication approach to show that it protects all the interacting entities against various known cyber attacks. In addition, we vali-date our authentication scheme using the SPAN of AVISPA tool to confirm that it protects end users against several attacks. We evaluate our proposed authentication approach by com-paring it against state-of-the-art authentication schemes. Finally, through a case study and performance evaluation, we illustrate that our approach provides a secure and lightweight mutual key exchange protocol between three parties: the cloud, fog and edge devices. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 47 条
[1]  
Abbasi B.Z., 2017, 2017 23 INT C AUTOMA, P1
[2]  
Abubaker N, 2017, IEEE CONF COMM NETW, P502, DOI 10.1109/CNS.2017.8228709
[3]  
[Anonymous], 2018, ARXIV181000305
[4]  
[Anonymous], 2018, Internet of Everything: Algorithms, Methodologies, Technologies and Perspectives, DOI DOI 10.1007/978-981-10-5861-5_5
[5]  
AVISPA, AVISPA: Automated validation of Internet security protocols and applications
[6]  
Basin David A., 2005, International Journal of Information Security, V4, P181, DOI [10.1007/s10207-004-0055-7, DOI 10.1007/S10207-004-0055-7]
[7]   A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment [J].
Ben Amor, Arij ;
Abid, Mohamed ;
Meddeb, Aref .
2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, :1225-1231
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Bonomi F., 2014, Big Data and Internet of Things, P169, DOI 10.1007/978-3-319-05029-4_7
[10]   The Internet of Things vision: Key features, applications and open issues [J].
Borgia, Eleonora .
COMPUTER COMMUNICATIONS, 2014, 54 :1-31