Visible to the public Scalable and Efficient Mutual Authentication Strategy in Fog Computing

TitleScalable and Efficient Mutual Authentication Strategy in Fog Computing
Publication TypeConference Paper
Year of Publication2020
AuthorsBavishi, Jatna, Shaikh, Mohammed Saad, Patel, Reema
Conference Name2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)
Keywordsdigital-certificate, Elliptic-Curve-Cryptography-(ECC), Elliptic-Curve-Digital-Signature-Algorithm-(ECDSA), fog-computing, Human Behavior, human factors, Metrics, multifactor authentication, mutual-authentication, pubcrawl, resilience, Resiliency
AbstractFog Computing paradigm extends the cloud computing to the edge of the network to resolve the problem of latency but this introduces new security and privacy issues. So, it is necessary that a user must be authenticated before initiating data exchange in order to preserve the integrity. Secondly, in fog computing, fog node must also be authorized for ensuring the proper behaviour of fog node and validate that the fog node is not corrupted. Hence, we proposed a mutual authentication scheme which verifies both the fog node and the end user before the transfer of data. Traditional authentication protocol uses digital certificate and digital signature which faces the problem of scalability and more complexity respectively. So, in the proposed architecture, the problem of scalability and complexity is reduced to a greater extent compared to traditional authentication techniques. The proposed scheme also ensures multi-factor authentication of the user before sending the data and it is way too efficient.
DOI10.1109/MobileCloud48802.2020.00019
Citation Keybavishi_scalable_2020