Design of secure key management and user authentication scheme for fog computing services

被引:152
|
作者
Wazid, Mohammad [1 ]
Das, Ashok Kumar [2 ]
Kumar, Neeraj [3 ]
Vasilakos, Athanasios V. [4 ]
机构
[1] Innopolis Univ, Cyber Secur & Networks Lab, Innopolis, Russia
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[3] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[4] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, S-97187 Lulea, Sweden
关键词
Fog computing; Key management; Authentication; Services; Security; AVISPA; NS2; simulation; AGREEMENT SCHEME; ENCRYPTION SCHEME; CLOUD; PRIVACY; EFFICIENT; PROTOCOL; ARCHITECTURE; BIOMETRICS; SCENARIOS; EXCHANGE;
D O I
10.1016/j.future.2018.09.017
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fog computing (fog networking) is known as a decentralized computing infrastructure in which data, applications, compute as well as data storage are scattered in the most logical and efficient place among the data source (i.e., smart devices) and the cloud. It gives better services than cloud computing because it has better performance with reasonably low cost. Since the cloud computing has security and privacy issues, and fog computing is an extension of cloud computing, it is therefore obvious that fog computing will inherit those security and privacy issues from cloud computing. In this paper, we design a new secure key management and user authentication scheme for fog computing environment, called SAKA-FC. SAKA-FC is efficient as it only uses the lightweight operations, such as one-way cryptographic hash function and bitwise exclusive-OR (XOR), for the smart devices as they are resource-constrained in nature. SAKA-FC is shown to be secure with the help of the formal security analysis using the broadly accepted Real Or -Random (ROR) model, the formal security verification using the widely-used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and also the informal security analysis. In addition, SAKA-FC is implemented for practical demonstration using the widely-used NS2 simulator. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:475 / 492
页数:18
相关论文
共 50 条
  • [21] A Key Management Scheme Based on Hypergraph for Fog Computing
    Li, Zhi
    Liu, Yanzhu
    Liu, Di
    Li, Chunyang
    Cui, Wei
    Hu, Guanglin
    [J]. CHINA COMMUNICATIONS, 2018, 15 (11) : 158 - 170
  • [22] New User Authentication and Key Management Scheme for Secure Data Transmission in Wireless Mobile Multicast
    Eya, N.
    Elkhazmi, E.
    Jituboh, E.
    Masri, A.
    Dama, Y.
    Ahmed, Nuredin A. S.
    Abdul-jalil, C.
    Fayemi, O.
    Shephred, S. J.
    Abd-Alhameed, Raed
    [J]. PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE INTERNET TECHNOLOGIES AND APPLICATIONS (ITA), 2017, : 264 - 269
  • [23] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    [J]. 2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [24] Secure deduplication with reliable and revocable key management in fog computing
    Kwon, Hyunsoo
    Hahn, Changhee
    Kang, Kyungtae
    Hur, Junbeom
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (04) : 850 - 864
  • [25] Secure deduplication with reliable and revocable key management in fog computing
    Hyunsoo Kwon
    Changhee Hahn
    Kyungtae Kang
    Junbeom Hur
    [J]. Peer-to-Peer Networking and Applications, 2019, 12 : 850 - 864
  • [26] A secure authentication and key agreement scheme for roaming service with user anonymity
    Arshad, Hamed
    Rasoolzadegan, Abbas
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (18)
  • [27] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [28] Lightweight Secure Authentication and Key Distribution Scheme for Vehicular Cloud Computing
    Goumidi, Hadjer
    Harous, Saad
    Aliouat, Zibouda
    Gueroui, Abdelhak Mourad
    [J]. SYMMETRY-BASEL, 2021, 13 (03):
  • [29] Biometric-Kerberos Authentication Scheme for Secure Mobile Computing Services
    Han, Fengling
    Alkhathami, Mohammed
    Van Schyndel, Ron
    [J]. 2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 1694 - 1698
  • [30] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    [J]. PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,