Visible to the public An Efficient Authentication Scheme for Fog Computing Environment using Symmetric Cryptographic methods

TitleAn Efficient Authentication Scheme for Fog Computing Environment using Symmetric Cryptographic methods
Publication TypeConference Paper
Year of Publication2021
AuthorsGowda, Naveen Chandra, Manvi, Sunilkumar S.
Conference Name2021 IEEE 9th Region 10 Humanitarian Technology Conference (R10-HTC)
Date Publishedsep
Keywordsauthentication, cloud computing, Costs, Fog Computing, Fuzzy Cryptography, Key Management, Mobile handsets, ProVerif, pubcrawl, resilience, Resiliency, Resists, Scalability, security, security issues, Servers
Abstract

The mechanism of Fog computing is a distributed infrastructure to provide the computations as same as cloud computing. The fog computing environment provides the storage and processing of data in a distributed manner based on the locality. Fog servicing is better than cloud service for working with smart devices and users in a same locale. However the fog computing will inherit the features of the cloud, it also suffers from many security issues as cloud. One such security issue is authentication with efficient key management between the communicating entities. In this paper, we propose a secured two-way authentication scheme with efficient management of keys between the user mobile device and smart devices under the control of the fog server. We made use of operations such as one-way hash (SHA-512) functions, bitwise XOR, and fuzzy extractor function to make the authentication system to be better. We have verified the proposed scheme for its security effectiveness by using a well-used analysis tool ProVerif. We also proved that it can resist multiple attacks and the security overhead is reduced in terms of computation and communication cost as compared to the existing methods.

DOI10.1109/R10-HTC53172.2021.9641591
Citation Keygowda_efficient_2021