MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture
Title | MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Imine, Y., Kouicem, D. E., Bouabdallah, A., Ahmed, L. |
Conference Name | 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) |
Keywords | authentication, Authentication protocols, Authentication schemes, cloud computing, cloud computing services, Computer architecture, cryptographic protocols, cryptography, edge computing, edge devices, edge resources, efficient mutual authentication scheme, end devices, entry point, Fog Computing, Fog Computing and Security, fog servers, fog-computing requirements, latency issues, latency problems, pubcrawl, Resiliency, Scalability, security, security places, security service, security system, Servers, telecommunication security |
Abstract | Fog computing is a new paradigm which extends cloud computing services into the edge of the network. Indeed, it aims to pool edge resources in order to deal with cloud's shortcomings such as latency problems. However, this proposal does not ensure the honesty and the good behavior of edge devices. Thus, security places itself as an important challenge in front of this new proposal. Authentication is the entry point of any security system, which makes it an important security service. Traditional authentication schemes endure latency issues and some of them do not satisfy fog-computing requirements such as mutual authentication between end devices and fog servers. Thus, new authentication protocols need to be implemented. In this paper, we propose a new efficient authentication scheme for fog computing architecture. Our scheme ensures mutual authentication and remedies to fog servers' misbehaviors. Moreover, fog servers need to hold only a couple of information to verify the authenticity of every user in the system. Thus, it provides a low overhead in terms of storage capacity. Finally, we show through experimentation the efficiency of our scheme. |
URL | https://ieeexplore.ieee.org/document/8455959 |
DOI | 10.1109/TrustCom/BigDataSE.2018.00091 |
Citation Key | imine_masfog:_2018 |
- Fog computing
- telecommunication security
- Servers
- security system
- security service
- security places
- security
- Scalability
- Resiliency
- pubcrawl
- latency problems
- latency issues
- fog-computing requirements
- fog servers
- Fog Computing and Security
- authentication
- entry point
- end devices
- efficient mutual authentication scheme
- edge resources
- edge devices
- edge computing
- Cryptography
- Cryptographic Protocols
- computer architecture
- cloud computing services
- Cloud Computing
- Authentication schemes
- Authentication Protocols