Visible to the public Biblio

Filters: Keyword is Elliptic-Curve-Cryptography-(ECC)  [Clear All Filters]
2021-09-30
Bavishi, Jatna, Shaikh, Mohammed Saad, Patel, Reema.  2020.  Scalable and Efficient Mutual Authentication Strategy in Fog Computing. 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). :77–83.
Fog Computing paradigm extends the cloud computing to the edge of the network to resolve the problem of latency but this introduces new security and privacy issues. So, it is necessary that a user must be authenticated before initiating data exchange in order to preserve the integrity. Secondly, in fog computing, fog node must also be authorized for ensuring the proper behaviour of fog node and validate that the fog node is not corrupted. Hence, we proposed a mutual authentication scheme which verifies both the fog node and the end user before the transfer of data. Traditional authentication protocol uses digital certificate and digital signature which faces the problem of scalability and more complexity respectively. So, in the proposed architecture, the problem of scalability and complexity is reduced to a greater extent compared to traditional authentication techniques. The proposed scheme also ensures multi-factor authentication of the user before sending the data and it is way too efficient.