FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain

被引:38
|
作者
Patwary, Abdullah Al-Noman [1 ]
Fu, Anmin [1 ]
Battula, Sudheer Kumar [2 ]
Naha, Ranesh Kumar [2 ]
Garg, Saurabh [2 ]
Mahanti, Aniket [3 ,4 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Peoples R China
[2] Univ Tasmania, Sch Technol Environm & Design TED, Hobart, Tas, Australia
[3] Univ Auckland, Sch Comp Sci, Auckland, New Zealand
[4] Univ New Brunswick, St John, NB, Canada
关键词
Fog computing; Security and privacy; Authentication; Device-to-Device communication; Blockchain; Digital identity; Location management; SMART CARD; PRIVACY; ARCHITECTURE; ISSUES;
D O I
10.1016/j.comcom.2020.08.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is an emerging computing paradigm which expands cloud-based computing services near the network edge. With this new computing paradigm, new challenges arise in terms of security and privacy. These concerns are due to the distributed ownership of Fog devices. Because of the large scale distributed nature of devices at the Fog layer, secure authentication for communication among these devices is a major challenge. The traditional authentication methods (password-based, certificate-based and biometric-based) are not directly applicable due to the unique architecture and characteristics of the Fog. Moreover, the traditional authentication methods consume significantly more computation power and incur high latency, and this does not meet the key requirements of the Fog. To fill this gap, this article proposes a secure decentralised location-based device to device (D2D) authentication model in which Fog devices can mutually authenticate each other at the Fog layer by using Blockchain. We considered an Ethereum Blockchain platform for the Fog device registration, authentication, attestation and data storage. We presented the overall system architecture, various participants and their transactions and message interaction between the participants. We validated the proposed model by comparing it with the existing method; results showed that the proposed authentication mechanism was efficient and secure. From the performance evaluation, it was found that the proposed method is computationally efficient and secure in a highly distributed Fog network.
引用
收藏
页码:212 / 224
页数:13
相关论文
共 50 条
  • [1] Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
    Huang, Baiyi
    Cheng, Xiuzhen
    Cao, Yuan
    Zhang, Le
    2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 433 - 439
  • [2] Blockchain-Based Secure Authentication with Improved Performance for Fog Computing
    Umoren, Otuekong
    Singh, Raman
    Awan, Shahid
    Pervez, Zeeshan
    Dahal, Keshav
    SENSORS, 2022, 22 (22)
  • [3] Location-Based Reliable Sharding in Blockchain-Enabled Fog Computing Networks
    Huang, Xiaoge
    Yin, Hongbo
    Wang, Yongsheng
    Chen, Qianbin
    Zhang, Jie
    2022 14TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING, WCSP, 2022, : 12 - 16
  • [4] Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain
    Ryu, Jongseok
    Son, Seunghwan
    Lee, Joonyoung
    Park, Yohan
    Park, Youngho
    IEEE ACCESS, 2022, 10 : 98944 - 98958
  • [5] Blockchain-Based Authentication Scheme for Collaborative Traffic Light Systems Using Fog Computing
    Namane, Sarra
    Ahmim, Marwa
    Kondoro, Aron
    Ben Dhaou, Imed
    ELECTRONICS, 2023, 12 (02)
  • [6] A blockchain authentication scheme for UAV-aided fog computing
    Du, Xiaoyu
    Tao, Song
    Yuan, Ke
    Li, Yinyin
    Zhou, Yi
    COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (02) : 1689 - 1702
  • [7] A blockchain authentication scheme for UAV-aided fog computing
    Xiaoyu Du
    Song Tao
    Ke Yuan
    Yinyin Li
    Yi Zhou
    Complex & Intelligent Systems, 2024, 10 : 1689 - 1702
  • [8] A Novel Blockchain Identity Authentication Scheme Implemented in Fog Computing
    Wang, Huijuan
    Jiang, Yong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [9] A clogging resistant secure authentication scheme for fog computing services
    Ali, Zeeshan
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Garg, Sahil
    Lv, Zhihan
    Bin Zikria, Yousaf
    COMPUTER NETWORKS, 2021, 185
  • [10] FogSec: A secure and effective mutual authentication scheme for fog computing
    Sree, Thankaraja Raja
    Harish, R.
    Veni, T.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (12):