TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments

被引:1
|
作者
Gowda, Naveen Chandra [1 ,2 ]
Manvi, Sunilkumar S. [2 ]
Malakreddy, A. Bharathi [3 ]
Buyya, Rajkumar [4 ]
机构
[1] BMS Inst Technol & Management, Bengaluru, India
[2] REVA Univ, Sch Comp Sci & Engn, Bengaluru, India
[3] BMS Inst Technol & Management, Dept AI & ML, Bengaluru, India
[4] Univ Melbourne, Sch Comp & Informat Syst, Melbourne, Vic 3010, Australia
来源
JOURNAL OF SUPERCOMPUTING | 2024年 / 80卷 / 05期
关键词
Cloud computing; Fog computing; Authentication; Key management; iFogSim; PROTOCOL; SECURITY; MODEL;
D O I
10.1007/s11227-023-05712-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A mechanism of fog computing environment is employed in order to enhance the cloud computing services toward the edge devices in a range of locations with low latency. A fog computing environment is effective when compared to cloud computing for providing communication between various edge devices such as smart devices and mobile devices used by users in the same location. Even though fog servicing extends the best services of cloud computing, it also suffers from a set of security threats like authentication, key management, data privacy and trust management. Authentication with effective key management between edge devices is the most pressing security issue in fog computing. This paper proposes an effective two-way authentication between edge devices with key management in fog computing environments (TAKM-FC). The edge nodes are the user's mobile devices and set of smart devices controlled by the fog server. To improve the proposed authentication system, we have made use of techniques like fuzzy extractor and one-way hash with cryptographic primitives. The proposed TAKM-FC scheme is validated mathematically based on the ROR model and then verified using the ProVerif tool. The TAKM-FC scheme has been evaluated using iFogSim to measure the performance parameters like throughput, end-to-end delay, packet loss, energy consumption and network usage. The overhead analysis of the proposed scheme is carried out and shows that the computation cost, communication cost and storage cost are improved by 11-21%, 8-19% and 6-13%, respectively, compared to existing schemes.
引用
收藏
页码:6855 / 6890
页数:36
相关论文
共 27 条
  • [1] TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments
    Naveen Chandra Gowda
    Sunilkumar S. Manvi
    A. Bharathi Malakreddy
    Rajkumar Buyya
    [J]. The Journal of Supercomputing, 2024, 80 : 6855 - 6890
  • [2] A two-way trust management system for fog computing
    Alemneh, Esubalew
    Senouci, Sidi-Mohammed
    Brunet, Philippi
    Tegegne, Tesf
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 106 (106): : 206 - 220
  • [3] SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing
    Kaliya, Neha
    Pawar, Digambar
    Sriram, Thota
    [J]. ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT I, 2024, 2090 : 349 - 365
  • [4] Quantum key distribution with two-way authentication
    Xiaobo Zheng
    Zhiwen Zhao
    [J]. Optical and Quantum Electronics, 2021, 53
  • [5] Quantum key distribution with two-way authentication
    Zheng, Xiaobo
    Zhao, Zhiwen
    [J]. OPTICAL AND QUANTUM ELECTRONICS, 2021, 53 (06)
  • [6] Dynamic Group Key Management for Efficient Fog Computing
    Lim, Jiyoung
    Doh, Inshil
    Chae, Kijoon
    [J]. INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 685 - 694
  • [7] Timely Two-Way Data Exchanging in Unilaterally Powered Fog Computing Systems
    Dong, Yunquan
    Chen, Zhengchuan
    Fan, Pingyi
    [J]. IEEE ACCESS, 2019, 7 : 21103 - 21117
  • [8] A two-way trust routing scheme to improve security in fog computing environment
    Wang, Jun
    Luo, Ze
    Wang, Chenglong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (09): : 13165 - 13185
  • [9] Evaluation of a Two-Way Tree-Based Fog Computing (TWTBFC) Model
    Guo, Yinzhe
    Oma, Ryuji
    Nakamura, Shigenari
    Duolikun, Dilawaer
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2019, 2020, 994 : 72 - 81
  • [10] Design of secure key management and user authentication scheme for fog computing services
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 (475-492): : 475 - 492