Skip to main content
Erschienen in: Wireless Personal Communications 4/2021

14.10.2020

Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment

verfasst von: K. N. Pallavi, V. Ravi Kumar

Erschienen in: Wireless Personal Communications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The emergence of fog computing has witnessed a big role in initiating secure communication amongst users. Fog computing poses the ability to perform analysis, processing, and storage for a set of Internet of Things (IoT) devices. Several IoT solutions are devised by utilizing the fog nodes to alleviate IoT devices from complex computation and heavy processing. This paper proposes an authentication scheme using fog nodes to manage IoT devices by providing security without considering a trusted third party. The proposed authentication scheme employed the benefits of fog node deployment. The authentication scheme using fog node offers reliable verification between the data owners and the requester without depending on the third party users. The proposed authentication scheme using fog nodes effectively solved the problems of a single point of failure in the storage system and offers many benefits by increasing the throughput and reducing the cost. The proposed scheme considers several entities, like end-users, IoT devices, fog nodes, and smart contracts, which help to administrate the authentication using access policies. The proposed authentication scheme using fog node provided superior results than other methods with minimal memory value of 4009.083 KB, minimal time of 76.915 s, and maximal Packet delivery ratio (PDR) of 76.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Almadhoun, R., Kadadha, M., Alhemeiri, M., Alshehhi, M. and Salah, K., “A user authentication scheme of iot devices using blockchain-enabled fog nodes”. In IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), (pp. 1–8), October 2018. Almadhoun, R., Kadadha, M., Alhemeiri, M., Alshehhi, M. and Salah, K., “A user authentication scheme of iot devices using blockchain-enabled fog nodes”. In IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), (pp. 1–8), October 2018.
2.
Zurück zum Zitat Gill, S. S., Garraghan, P., & Buyya, R. (2019). ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices. Journal of Systems and Software, 154, 125–138.CrossRef Gill, S. S., Garraghan, P., & Buyya, R. (2019). ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices. Journal of Systems and Software, 154, 125–138.CrossRef
3.
Zurück zum Zitat White, G., Nallur, V., & Clarke, S. (2017). Quality of service approaches in IoT: A systematic mapping. Journal of Systems and Software, 132, 186–203.CrossRef White, G., Nallur, V., & Clarke, S. (2017). Quality of service approaches in IoT: A systematic mapping. Journal of Systems and Software, 132, 186–203.CrossRef
4.
Zurück zum Zitat Gill, S. S., Chana, I., Singh, M., & Buyya, R. (2018). CHOPPER: an intelligent QoS-aware autonomic resource management approach for cloud computing. Cluster Computing, 21(2), 1203–1241.CrossRef Gill, S. S., Chana, I., Singh, M., & Buyya, R. (2018). CHOPPER: an intelligent QoS-aware autonomic resource management approach for cloud computing. Cluster Computing, 21(2), 1203–1241.CrossRef
5.
Zurück zum Zitat Dong, Yunquan, Chen, Zhengchuan, & Fan, Pingyi. (2019). Timely two-way data exchanging in unilaterally powered fog computing systems. IEEE Access, 7, 21103–21117.CrossRef Dong, Yunquan, Chen, Zhengchuan, & Fan, Pingyi. (2019). Timely two-way data exchanging in unilaterally powered fog computing systems. IEEE Access, 7, 21103–21117.CrossRef
6.
Zurück zum Zitat Wazid, M., Das, A. K., Kumar, N., & Vasilakos, A. V. (2019). Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems, 91, 475–492.CrossRef Wazid, M., Das, A. K., Kumar, N., & Vasilakos, A. V. (2019). Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems, 91, 475–492.CrossRef
7.
Zurück zum Zitat Ma, M., Shi, G., & Li, F. (2019). Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access, 7, 34045–34059.CrossRef Ma, M., Shi, G., & Li, F. (2019). Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access, 7, 34045–34059.CrossRef
8.
Zurück zum Zitat Jia, X., He, D., Kumar, N., & Choo, K. K. R. (2019). Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Networks, 25, 4737–4750.CrossRef Jia, X., He, D., Kumar, N., & Choo, K. K. R. (2019). Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Networks, 25, 4737–4750.CrossRef
9.
Zurück zum Zitat Thiyagarajan, K., & Manikandan, M. (2018). Fog assisted IoT based medical cyber system for cardiovascular diseases affected patients. Special Issue Advanced Algorithms for IoT Cloud computing and Cyber-Enabled Applications (ICAMMAET-ICTPACT2018), 31(12), 1–9. Thiyagarajan, K., & Manikandan, M. (2018). Fog assisted IoT based medical cyber system for cardiovascular diseases affected patients. Special Issue Advanced Algorithms for IoT Cloud computing and Cyber-Enabled Applications (ICAMMAET-ICTPACT2018), 31(12), 1–9.
10.
Zurück zum Zitat Elliott, A., & Knight, S. (2016). Start Here: Engineering scalable access control systems. In Proceedings of the 21st ACM on symposium on access control models and technologies (pp. 113–124). Elliott, A., & Knight, S. (2016). Start Here: Engineering scalable access control systems. In Proceedings of the 21st ACM on symposium on access control models and technologies (pp. 113–124).
11.
Zurück zum Zitat Xia, Qi, Sifah, Emmanuel Boateng, Smahi, Abla, Amofa, Sandro, & Zhang, Xiaosong. (2017). BBDS: Blockchain-based data sharing for electronic medical records in cloud environments. Information, 8(2), 44.CrossRef Xia, Qi, Sifah, Emmanuel Boateng, Smahi, Abla, Amofa, Sandro, & Zhang, Xiaosong. (2017). BBDS: Blockchain-based data sharing for electronic medical records in cloud environments. Information, 8(2), 44.CrossRef
12.
Zurück zum Zitat kulkarni, Yogesh R., & Senthil Murugan, T. (2019). Hybrid weed-particle swarm optimization algorithm and CMixture for data publishing. Multimedia Research (MR), 2(3), 33–42. kulkarni, Yogesh R., & Senthil Murugan, T. (2019). Hybrid weed-particle swarm optimization algorithm and CMixture for data publishing. Multimedia Research (MR), 2(3), 33–42.
13.
Zurück zum Zitat Swamy, S. M., Rajakumar B. R., and Valarmathi, I. R. (2013) Design of hybrid wind and photovoltaic power system using opposition-based genetic algorithm with cauchy mutation. In IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems, Chennai, India. Swamy, S. M., Rajakumar B. R., and Valarmathi, I. R. (2013) Design of hybrid wind and photovoltaic power system using opposition-based genetic algorithm with cauchy mutation. In IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems, Chennai, India.
14.
Zurück zum Zitat Ni, J., Lin, X., & Shen, X. S. (2018). Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE Journal on Selected Areas in Communications, 36(3), 644–657.CrossRef Ni, J., Lin, X., & Shen, X. S. (2018). Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE Journal on Selected Areas in Communications, 36(3), 644–657.CrossRef
15.
Zurück zum Zitat Mukherjee, B., Wang, S., Lu, W., Neupane, R. L., Dunn, D., Ren, Y., et al. (2018). Flexible IoT security middleware for end-to-end cloud–fog communication. Future Generation Computer Systems, 87, 688–703.CrossRef Mukherjee, B., Wang, S., Lu, W., Neupane, R. L., Dunn, D., Ren, Y., et al. (2018). Flexible IoT security middleware for end-to-end cloud–fog communication. Future Generation Computer Systems, 87, 688–703.CrossRef
16.
Zurück zum Zitat Wazid, M., Bagga, P., Das, A. K., Shetty, S., Rodrigues, J. J., & Park, Y. H. (2019). AKM-IoV: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet of Things Journal, 6(5), 8804–8817.CrossRef Wazid, M., Bagga, P., Das, A. K., Shetty, S., Rodrigues, J. J., & Park, Y. H. (2019). AKM-IoV: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet of Things Journal, 6(5), 8804–8817.CrossRef
17.
Zurück zum Zitat Idrus, S. Z. S., Cherrier, E., Rosenberger, C., & Schwartzmann, J. J. (2013). A review on authentication methods. Australian Journal of Basic and Applied Sciences, 7(5), 95–107. Idrus, S. Z. S., Cherrier, E., Rosenberger, C., & Schwartzmann, J. J. (2013). A review on authentication methods. Australian Journal of Basic and Applied Sciences, 7(5), 95–107.
18.
Zurück zum Zitat Ali, G., Ahmad, N., Cao, Y., Asif, M., Cruickshank, H., & Ali, Q. (2019). Blockchain based permission delegation and access control in internet of things (BACI). Computers and Security, 86, 318–334.CrossRef Ali, G., Ahmad, N., Cao, Y., Asif, M., Cruickshank, H., & Ali, Q. (2019). Blockchain based permission delegation and access control in internet of things (BACI). Computers and Security, 86, 318–334.CrossRef
19.
Zurück zum Zitat Sandhu, R. S., & Samarati, P. (1994). Access control: Principle and practice. IEEE Communications Magazine, 32(9), 40–48.CrossRef Sandhu, R. S., & Samarati, P. (1994). Access control: Principle and practice. IEEE Communications Magazine, 32(9), 40–48.CrossRef
20.
Zurück zum Zitat Surendran, Priyanka, & Valsalan, Prajoona. (2018). Iot based breath sensor for mycobacterium tuberculosis. Journal of Advanced Research in Dynamical & Control Systems, 10(15), 670–674. Surendran, Priyanka, & Valsalan, Prajoona. (2018). Iot based breath sensor for mycobacterium tuberculosis. Journal of Advanced Research in Dynamical & Control Systems, 10(15), 670–674.
21.
Zurück zum Zitat Valsalan, Ali Hussain Omar Baabood Prajoona, & Baomar, Tariq Ahmed Barham. (2020). IoT based Health Monitoring System. Journal of Critical Reviews, 7(4), 739–743. Valsalan, Ali Hussain Omar Baabood Prajoona, & Baomar, Tariq Ahmed Barham. (2020). IoT based Health Monitoring System. Journal of Critical Reviews, 7(4), 739–743.
22.
Zurück zum Zitat Barbareschi, M., De Benedictis, A., La Montagna, E., Mazzeo, A., & Mazzocca, N. (2019). A PUF-based mutual authentication scheme for Cloud-Edges IoT systems. Future Generation Computer Systems., 101, 246–261.CrossRef Barbareschi, M., De Benedictis, A., La Montagna, E., Mazzeo, A., & Mazzocca, N. (2019). A PUF-based mutual authentication scheme for Cloud-Edges IoT systems. Future Generation Computer Systems., 101, 246–261.CrossRef
23.
Zurück zum Zitat Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.CrossRef Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.CrossRef
24.
Zurück zum Zitat Cirani, S., Picone, M., Gonizzi, P., Veltri, L., & Ferrari, G. (2014). Iot-oas: An oauth-based authorization service architecture for secure services in IoT scenarios. IEEE Sensors Journal, 15(2), 1224–1234.CrossRef Cirani, S., Picone, M., Gonizzi, P., Veltri, L., & Ferrari, G. (2014). Iot-oas: An oauth-based authorization service architecture for secure services in IoT scenarios. IEEE Sensors Journal, 15(2), 1224–1234.CrossRef
25.
Zurück zum Zitat Alonso, Á., Fernández, F., Marco, L., & Salvachúa, J. (2017). Iaacaas: Iot application-scoped access control as a service. Future Internet, 9(4), 64.CrossRef Alonso, Á., Fernández, F., Marco, L., & Salvachúa, J. (2017). Iaacaas: Iot application-scoped access control as a service. Future Internet, 9(4), 64.CrossRef
26.
Zurück zum Zitat Borgohain, T., Borgohain, A., Kumar, U. and Sanyal, S., “Authentication systems in internet of things”, arXiv preprint arXiv:1502.00870, 2015. Borgohain, T., Borgohain, A., Kumar, U. and Sanyal, S., “Authentication systems in internet of things”, arXiv preprint arXiv:​1502.​00870, 2015.
27.
Zurück zum Zitat Liu, Hong, Zhang, Yan, & Yang, Tao. (2018). Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing. Security and privacy of connected vehicular cloudcomputing. IEEE Network, 32(3), 78–83.CrossRef Liu, Hong, Zhang, Yan, & Yang, Tao. (2018). Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing. Security and privacy of connected vehicular cloudcomputing. IEEE Network, 32(3), 78–83.CrossRef
28.
Zurück zum Zitat AmitSahai, and Brent Waters (May 2005). Fuzzy Identity-Based Encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, (pp. 457–473). AmitSahai, and Brent Waters (May 2005). Fuzzy Identity-Based Encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, (pp. 457–473).
29.
Zurück zum Zitat Bai, J. and Hao, R. (2019) Comment on “Privacy-preserving public auditing for non-manager group shared data. The Journal of Supercomputing, 1–15. Bai, J. and Hao, R. (2019) Comment on “Privacy-preserving public auditing for non-manager group shared data. The Journal of Supercomputing, 1–15.
30.
Zurück zum Zitat Wang, Shangping, Zhang, Yinglong, & Zhang, Yaling. (2018). A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access, 6, 38437–38450.CrossRef Wang, Shangping, Zhang, Yinglong, & Zhang, Yaling. (2018). A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access, 6, 38437–38450.CrossRef
31.
Zurück zum Zitat Kahvazadeh, S., Masip-Bruin, X., Diaz, R., Marín-Tordera, E., Jurnet, A. and Garcia, J. (2018). Towards an efficient key management and authentication strategy for combined fog-to-cloud continuum systems”, In 3rd Cloudification of the Internet of Things (CIoT), (pp. 1–7). Kahvazadeh, S., Masip-Bruin, X., Diaz, R., Marín-Tordera, E., Jurnet, A. and Garcia, J. (2018). Towards an efficient key management and authentication strategy for combined fog-to-cloud continuum systems”, In 3rd Cloudification of the Internet of Things (CIoT), (pp. 1–7).
32.
Zurück zum Zitat Yassine, A., Singh, S., Hossain, M. S., & Muhammad, G. (2019). IoT big data analytics for smart homes with fog and cloud computing. Future Generation Computer Systems, 91, 563–573.CrossRef Yassine, A., Singh, S., Hossain, M. S., & Muhammad, G. (2019). IoT big data analytics for smart homes with fog and cloud computing. Future Generation Computer Systems, 91, 563–573.CrossRef
Metadaten
Titel
Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
verfasst von
K. N. Pallavi
V. Ravi Kumar
Publikationsdatum
14.10.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07834-w

Weitere Artikel der Ausgabe 4/2021

Wireless Personal Communications 4/2021 Zur Ausgabe

Neuer Inhalt