Design of secure key management and user authentication scheme for fog computing services

被引:152
|
作者
Wazid, Mohammad [1 ]
Das, Ashok Kumar [2 ]
Kumar, Neeraj [3 ]
Vasilakos, Athanasios V. [4 ]
机构
[1] Innopolis Univ, Cyber Secur & Networks Lab, Innopolis, Russia
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[3] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[4] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, S-97187 Lulea, Sweden
关键词
Fog computing; Key management; Authentication; Services; Security; AVISPA; NS2; simulation; AGREEMENT SCHEME; ENCRYPTION SCHEME; CLOUD; PRIVACY; EFFICIENT; PROTOCOL; ARCHITECTURE; BIOMETRICS; SCENARIOS; EXCHANGE;
D O I
10.1016/j.future.2018.09.017
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fog computing (fog networking) is known as a decentralized computing infrastructure in which data, applications, compute as well as data storage are scattered in the most logical and efficient place among the data source (i.e., smart devices) and the cloud. It gives better services than cloud computing because it has better performance with reasonably low cost. Since the cloud computing has security and privacy issues, and fog computing is an extension of cloud computing, it is therefore obvious that fog computing will inherit those security and privacy issues from cloud computing. In this paper, we design a new secure key management and user authentication scheme for fog computing environment, called SAKA-FC. SAKA-FC is efficient as it only uses the lightweight operations, such as one-way cryptographic hash function and bitwise exclusive-OR (XOR), for the smart devices as they are resource-constrained in nature. SAKA-FC is shown to be secure with the help of the formal security analysis using the broadly accepted Real Or -Random (ROR) model, the formal security verification using the widely-used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and also the informal security analysis. In addition, SAKA-FC is implemented for practical demonstration using the widely-used NS2 simulator. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:475 / 492
页数:18
相关论文
共 50 条
  • [1] A clogging resistant secure authentication scheme for fog computing services
    Ali, Zeeshan
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Garg, Sahil
    Lv, Zhihan
    Bin Zikria, Yousaf
    [J]. COMPUTER NETWORKS, 2021, 185
  • [2] SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing
    Kaliya, Neha
    Pawar, Digambar
    Sriram, Thota
    [J]. ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT I, 2024, 2090 : 349 - 365
  • [3] A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
    Weng, Chi-Yao
    Li, Chun-Ta
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Deng, Yong-Yuan
    [J]. IEEE ACCESS, 2021, 9 : 145522 - 145537
  • [4] Key Management Scheme for Secure Channel Establishment in Fog Computing
    Zhang, Lei
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (03) : 1117 - 1128
  • [5] On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. IEEE ACCESS, 2017, 5 : 25808 - 25825
  • [6] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [7] Analysis and Improvement of an Authentication Scheme for Fog Computing Services
    HUO Yuyan
    KANG Baoyuan
    NIU Shufang
    LI Anqian
    ZUO Xinyu
    [J]. Wuhan University Journal of Natural Sciences, 2024, 29 (03) : 209 - 218
  • [8] Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
    Huang, Baiyi
    Cheng, Xiuzhen
    Cao, Yuan
    Zhang, Le
    [J]. 2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 433 - 439
  • [9] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    [J]. ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [10] FogSec: A secure and effective mutual authentication scheme for fog computing
    Sree, Thankaraja Raja
    Harish, R.
    Veni, T.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (12):