Scalable and Efficient Mutual Authentication Strategy In Fog Computing

2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)(2020)

引用 3|浏览2
暂无评分
摘要
Fog Computing paradigm extends the cloud computing to the edge of the network to resolve the problem of latency but this introduces new security and privacy issues. So, it is necessary that a user must be authenticated before initiating data exchange in order to preserve the integrity. Secondly, in fog computing, fog node must also be authorized for ensuring the proper behaviour of fog node and validate that the fog node is not corrupted. Hence, we proposed a mutual authentication scheme which verifies both the fog node and the end user before the transfer of data. Traditional authentication protocol uses digital certificate and digital signature which faces the problem of scalability and more complexity respectively. So, in the proposed architecture, the problem of scalability and complexity is reduced to a greater extent compared to traditional authentication techniques. The proposed scheme also ensures multi-factor authentication of the user before sending the data and it is way too efficient.
更多
查看译文
关键词
fog computing,mutual authentication,digital certificate,Elliptic Curve Cryptography (ECC),Elliptic Curve Digital Signature Algorithm (ECDSA)
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要