Secure and novel authentication model for protecting data centers in fog environment

被引:0
作者
P. C. Senthil Mahesh
K. Muthumanickam
机构
[1] Excel Engineering College,Department of Computer Science and Engineering
[2] Kongunadu College of Engineering and Technology (Autonomous),Department of Information Technology
来源
Wireless Networks | 2023年 / 29卷
关键词
Fog; Edge computing; Authentication; Cloud; Data center; Security;
D O I
暂无
中图分类号
学科分类号
摘要
The model of the fog environment for real-time applications has recently become a research area of intense interest as it offers cloud services instantly to users. Fog computing also resolves several important and challenging issues related to the cloud computing model, including latency issues. Despite these added services, however, the fog networking infrastructure is still based on an emerging standard that requires further research. Since an edge data Center is typically placed in a remote location, the requirements for protecting it through authentication mechanism have become a major focus. Most current solutions have addressed the optimization of load balancing, which is an important issue, but have failed to resolve several other challenging problems. Among the other prevalent issues in fog computing, security has become the most important and complex issue. This paper aims to address and resolve the question of security by recommending a lightweight, strong authentication scheme that ensures safe communication between edge data centers. The proposed security scheme is carefully assessed, and ensured that its computation cost is low compared with other exisitng solutions. The suggested scheme improves the security of the entire fog network by only permitting legitimate edge data centers while performing vital cloud computing services and is a suitable option for resource-constrained computational devices.
引用
收藏
页码:1671 / 1683
页数:12
相关论文
共 129 条
  • [1] Tang W(2020)Functional privacy-preserving outsourcing scheme with computation verifiability in fog computing KSII Transactions on Internet and Information Systems 14 281-298
  • [2] Bo Q(2018)Edge of things: The big picture on the integration of edge, IoT and the cloud in a distributed computing environment IEEE Access 6 1706-1717
  • [3] Li Y(2017)Non-cooperative power and latency aware load balancing in distributed data centers Journal of Parallel and Distributed Computing 107 76-86
  • [4] Wu Q(2017)Mitigating impact of short-term overload on multi-cloud web applications through geographical load balancing Concurrency and Computation: Practice and Experience 29 1-15
  • [5] El-Sayed H(2018)Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges Future Generation Computer Systems 78 680-698
  • [6] Sankar S(2017)Fog computing security: A review of current applications and security solutions Journal of Cloud Computing 6 6-9
  • [7] Prasad M(2020)Security issues in fog environment: A systematic literature review International Journal of Wireless Information Networks 27 467-483
  • [8] Puthal D(2019)Fog computing applications in smart cities: A systematic survey Wireless Networks 26 1-25
  • [9] Gupta A(2019)Toward fog based mobile crowd sensing systems: State of the art and opportunities IEEE Communications Magazine 57 78-83
  • [10] Mohanty M(2019)Fog computing for the internet of things: a survey ACM Transactions on Internet Technology (TOIT) 19 1-41