Skip to main content
Erschienen in: Wireless Networks 4/2023

30.12.2022 | Original Paper

Secure and novel authentication model for protecting data centers in fog environment

verfasst von: P. C. Senthil Mahesh, K. Muthumanickam

Erschienen in: Wireless Networks | Ausgabe 4/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The model of the fog environment for real-time applications has recently become a research area of intense interest as it offers cloud services instantly to users. Fog computing also resolves several important and challenging issues related to the cloud computing model, including latency issues. Despite these added services, however, the fog networking infrastructure is still based on an emerging standard that requires further research. Since an edge data Center is typically placed in a remote location, the requirements for protecting it through authentication mechanism have become a major focus. Most current solutions have addressed the optimization of load balancing, which is an important issue, but have failed to resolve several other challenging problems. Among the other prevalent issues in fog computing, security has become the most important and complex issue. This paper aims to address and resolve the question of security by recommending a lightweight, strong authentication scheme that ensures safe communication between edge data centers. The proposed security scheme is carefully assessed, and ensured that its computation cost is low compared with other exisitng solutions. The suggested scheme improves the security of the entire fog network by only permitting legitimate edge data centers while performing vital cloud computing services and is a suitable option for resource-constrained computational devices.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Tang, W., Bo, Q., Li, Y., & Wu, Q. (2020). Functional privacy-preserving outsourcing scheme with computation verifiability in fog computing. KSII Transactions on Internet and Information Systems, 14(1), 281–298. Tang, W., Bo, Q., Li, Y., & Wu, Q. (2020). Functional privacy-preserving outsourcing scheme with computation verifiability in fog computing. KSII Transactions on Internet and Information Systems, 14(1), 281–298.
2.
Zurück zum Zitat Tong, L., Li, Y., Gao, W. (2016). A hierarchical edge cloud architecture for mobile computing. In Proceeding of the 35th Annual IEEE International Conference on Computer Communications, San Francisco, USA, pp. 1–9. Tong, L., Li, Y., Gao, W. (2016). A hierarchical edge cloud architecture for mobile computing. In Proceeding of the 35th Annual IEEE International Conference on Computer Communications, San Francisco, USA, pp. 1–9.
3.
Zurück zum Zitat El-Sayed, H., Sankar, S., Prasad, M., Puthal, D., Gupta, A., Mohanty, M., & Lin, C.-T. (2018). Edge of things: The big picture on the integration of edge, IoT and the cloud in a distributed computing environment. IEEE Access, 6, 1706–1717.CrossRef El-Sayed, H., Sankar, S., Prasad, M., Puthal, D., Gupta, A., Mohanty, M., & Lin, C.-T. (2018). Edge of things: The big picture on the integration of edge, IoT and the cloud in a distributed computing environment. IEEE Access, 6, 1706–1717.CrossRef
4.
Zurück zum Zitat Tripathi, R., Vignesh, S., Tamarapalli, V., Chronopoulos, A. T., & Siar, H. (2017). Non-cooperative power and latency aware load balancing in distributed data centers. Journal of Parallel and Distributed Computing, 107, 76–86.CrossRef Tripathi, R., Vignesh, S., Tamarapalli, V., Chronopoulos, A. T., & Siar, H. (2017). Non-cooperative power and latency aware load balancing in distributed data centers. Journal of Parallel and Distributed Computing, 107, 76–86.CrossRef
5.
Zurück zum Zitat Qu, C., Calheiros, R. N., & Buyya, R. (2017). Mitigating impact of short-term overload on multi-cloud web applications through geographical load balancing. Concurrency and Computation: Practice and Experience, 29, 1–15.CrossRef Qu, C., Calheiros, R. N., & Buyya, R. (2017). Mitigating impact of short-term overload on multi-cloud web applications through geographical load balancing. Concurrency and Computation: Practice and Experience, 29, 1–15.CrossRef
6.
Zurück zum Zitat Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78(2), 680–698.CrossRef Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78(2), 680–698.CrossRef
7.
Zurück zum Zitat Khan, S., Parkinson, S., & Qin, Y. (2017). Fog computing security: A review of current applications and security solutions. Journal of Cloud Computing, 6, 6–9. Khan, S., Parkinson, S., & Qin, Y. (2017). Fog computing security: A review of current applications and security solutions. Journal of Cloud Computing, 6, 6–9.
8.
Zurück zum Zitat Li, Q. (2015). Security and privacy issues of fog computing: a survey. In Proceding of the International Conference on Wireless Schemes, Systems, and Applications, Springer, pp. 685–695. Li, Q. (2015). Security and privacy issues of fog computing: a survey. In Proceding of the International Conference on Wireless Schemes, Systems, and Applications, Springer, pp. 685–695.
9.
Zurück zum Zitat Jasleen, K., Agrawal, A., & Ahmad Khan, R. (2020). Security issues in fog environment: A systematic literature review. International Journal of Wireless Information Networks, 27, 467–483.CrossRef Jasleen, K., Agrawal, A., & Ahmad Khan, R. (2020). Security issues in fog environment: A systematic literature review. International Journal of Wireless Information Networks, 27, 467–483.CrossRef
10.
Zurück zum Zitat Javadzadeh, G., & Rahmani, A. M. (2019). Fog computing applications in smart cities: A systematic survey. Wireless Networks, 26, 1–25. Javadzadeh, G., & Rahmani, A. M. (2019). Fog computing applications in smart cities: A systematic survey. Wireless Networks, 26, 1–25.
11.
Zurück zum Zitat Belli, D., Chessa, S., Kantarci, B., & Foschini, L. (2019). Toward fog based mobile crowd sensing systems: State of the art and opportunities. IEEE Communications Magazine, 57(12), 78–83.CrossRef Belli, D., Chessa, S., Kantarci, B., & Foschini, L. (2019). Toward fog based mobile crowd sensing systems: State of the art and opportunities. IEEE Communications Magazine, 57(12), 78–83.CrossRef
12.
Zurück zum Zitat Puliafto, C., Mingozzi, E., Longo, F., Puliafto, A., & Rana, O. (2019). Fog computing for the internet of things: a survey. ACM Transactions on Internet Technology (TOIT), 19, 1–41.CrossRef Puliafto, C., Mingozzi, E., Longo, F., Puliafto, A., & Rana, O. (2019). Fog computing for the internet of things: a survey. ACM Transactions on Internet Technology (TOIT), 19, 1–41.CrossRef
13.
Zurück zum Zitat Wang, T., Yuzhu, L., Yujie, T., Anfeng, L., Md Zakirul Alam, B., & Taufiq Asyhari, A. (2019). Solving coupling security problem for sustainable sensor-cloud systems based on fog computing. IEEE Transactions on Sustainable Computing, 6, 43–539.CrossRef Wang, T., Yuzhu, L., Yujie, T., Anfeng, L., Md Zakirul Alam, B., & Taufiq Asyhari, A. (2019). Solving coupling security problem for sustainable sensor-cloud systems based on fog computing. IEEE Transactions on Sustainable Computing, 6, 43–539.CrossRef
14.
Zurück zum Zitat Muthanna, A., Abdelhamied, A. A., Khakimov, A., Gudkova, I., Abuarqoub, A., Samouylov, K., & Koucheryavy, A. (2019). Secure and reliable IoT networks using fog computing with software-defined networking and blockchain. Journal of Sensor and Actuator Networks, 8(1), 1–15.CrossRef Muthanna, A., Abdelhamied, A. A., Khakimov, A., Gudkova, I., Abuarqoub, A., Samouylov, K., & Koucheryavy, A. (2019). Secure and reliable IoT networks using fog computing with software-defined networking and blockchain. Journal of Sensor and Actuator Networks, 8(1), 1–15.CrossRef
15.
Zurück zum Zitat Khalid, T., Khan, A. N., Ali, M., Adeel, A., & Shuja, J. (2019). A fog based security framework for intelligent traffic light control system. Multimedia Tools and Applications, 78(17), 24595–24615.CrossRef Khalid, T., Khan, A. N., Ali, M., Adeel, A., & Shuja, J. (2019). A fog based security framework for intelligent traffic light control system. Multimedia Tools and Applications, 78(17), 24595–24615.CrossRef
16.
Zurück zum Zitat Zhu, L., Li, M., Zhang, Z., Xu, C., Zhang, R., Du, X., & Guizani, N. (2019). Privacy-preserving authentication and data aggregation for fog-based smart grid. IEEE Communications Magazine, 57(6), 80–85.CrossRef Zhu, L., Li, M., Zhang, Z., Xu, C., Zhang, R., Du, X., & Guizani, N. (2019). Privacy-preserving authentication and data aggregation for fog-based smart grid. IEEE Communications Magazine, 57(6), 80–85.CrossRef
17.
Zurück zum Zitat Jia, X., He, D., Kumar, N., & Choo, K. R. (2019). A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Systems Journal, 14(1), 560–571.CrossRef Jia, X., He, D., Kumar, N., & Choo, K. R. (2019). A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Systems Journal, 14(1), 560–571.CrossRef
18.
Zurück zum Zitat Ma, M., He, D., Wang, H., Kumar, N., & Choo, K. R. (2019). An efficient and provably-secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet of Things Journal, 6(5), 8065–8075.CrossRef Ma, M., He, D., Wang, H., Kumar, N., & Choo, K. R. (2019). An efficient and provably-secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet of Things Journal, 6(5), 8065–8075.CrossRef
19.
Zurück zum Zitat Imine, Y., Kouicem, D.E., Bouabdallah, A., Ahmed, L. (2018). MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture. In Proceeding of the 17th IEEE International Conference On Trust, Security and Privacy In Computing and Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, USA, pp. 608–613. Imine, Y., Kouicem, D.E., Bouabdallah, A., Ahmed, L. (2018). MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture. In Proceeding of the 17th IEEE International Conference On Trust, Security and Privacy In Computing and Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, USA, pp. 608–613.
20.
Zurück zum Zitat Wang, F., Xu, Y., Zhu, L., Du, X., & Guizani, M. (2018). LAMANCO: A lightweight anonymous mutual authentication scheme for n-times computing offloading in IoT. IEEE Internet of Things Journal, 6(3), 4462–4471.CrossRef Wang, F., Xu, Y., Zhu, L., Du, X., & Guizani, M. (2018). LAMANCO: A lightweight anonymous mutual authentication scheme for n-times computing offloading in IoT. IEEE Internet of Things Journal, 6(3), 4462–4471.CrossRef
21.
Zurück zum Zitat Shen, J., Yang, H., Wang, A., Zhou, T., & Wang, C. (2019). Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing. Peer-to-Peer Networking and Applications, 12(4), 924–933.CrossRef Shen, J., Yang, H., Wang, A., Zhou, T., & Wang, C. (2019). Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing. Peer-to-Peer Networking and Applications, 12(4), 924–933.CrossRef
22.
Zurück zum Zitat Wazida, M., Das, A. K., Kumar, N., & Vasilakos, A. V. (2019). Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems, 91, 475–492.CrossRef Wazida, M., Das, A. K., Kumar, N., & Vasilakos, A. V. (2019). Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems, 91, 475–492.CrossRef
23.
Zurück zum Zitat Jiang, Y., Susilo, W., Mu, Y., & Guo, F. (2018). Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Generation Computer Systems, 78(2), 720–729.CrossRef Jiang, Y., Susilo, W., Mu, Y., & Guo, F. (2018). Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Generation Computer Systems, 78(2), 720–729.CrossRef
24.
Zurück zum Zitat Yao, X., Kong, H., Liu, H., Qiu, T., & Ning, H. (2019). An attribute credential based public key scheme for fog computing in digital manufacturing. IEEE Transactions on Industrial Informatics, 15(4), 2297–2307.CrossRef Yao, X., Kong, H., Liu, H., Qiu, T., & Ning, H. (2019). An attribute credential based public key scheme for fog computing in digital manufacturing. IEEE Transactions on Industrial Informatics, 15(4), 2297–2307.CrossRef
25.
Zurück zum Zitat Puthal, D., Ranjan, R., Nanda, A., Nanda, P., Jayaraman, P. P., & Zomaya, A. Y. (2019). Secure authentication and load balancing of distributed edge data centers. Journal of Parallel Distributed Computing, 124, 60–69.CrossRef Puthal, D., Ranjan, R., Nanda, A., Nanda, P., Jayaraman, P. P., & Zomaya, A. Y. (2019). Secure authentication and load balancing of distributed edge data centers. Journal of Parallel Distributed Computing, 124, 60–69.CrossRef
26.
Zurück zum Zitat Mahmood, K., Chaudhry, S. A., Naqvi, H., Shon, T., & Ahmad, H. F. (2016). A lightweight message authentication scheme for Smart Grid communications in the power sector. Computers & Electrical Engineering, 52(c), 114–124.CrossRef Mahmood, K., Chaudhry, S. A., Naqvi, H., Shon, T., & Ahmad, H. F. (2016). A lightweight message authentication scheme for Smart Grid communications in the power sector. Computers & Electrical Engineering, 52(c), 114–124.CrossRef
27.
Zurück zum Zitat MuthuManickam, K., Elango, S., Senthil Mahesh, P. C., & Vijayalakshmi, P. (2019). EASS: Encryption and authentication based security scheme to prevent power exhausting attacks in wireless sensor networks. Ad Hoc and Wireless Sensor Networks, 45(3/4), 253–273. MuthuManickam, K., Elango, S., Senthil Mahesh, P. C., & Vijayalakshmi, P. (2019). EASS: Encryption and authentication based security scheme to prevent power exhausting attacks in wireless sensor networks. Ad Hoc and Wireless Sensor Networks, 45(3/4), 253–273.
29.
Zurück zum Zitat Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2017). DLSeF: A dynamic key-length-based efficient real-time security verification model for big data stream. ACM Transactions on Embedded Computing Systems, 16(2), 1–24.CrossRef Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2017). DLSeF: A dynamic key-length-based efficient real-time security verification model for big data stream. ACM Transactions on Embedded Computing Systems, 16(2), 1–24.CrossRef
30.
Zurück zum Zitat Priyadarshini, R., Kumar Barik, R., & Dubey, H. (2020). Fog-SDN: A light mitigation scheme for DDoS attack in fog computing framework. International Journal of Communication Systems, 33(9), 1–13.CrossRef Priyadarshini, R., Kumar Barik, R., & Dubey, H. (2020). Fog-SDN: A light mitigation scheme for DDoS attack in fog computing framework. International Journal of Communication Systems, 33(9), 1–13.CrossRef
31.
Zurück zum Zitat Aliyu, F., Sheltami, T., Mahmoud, A., Al-Awami, L., & Yasar, A. (2021). Detecting Man-in-the-middle attack in fog computing for social media. CMC-Computers Materials Continua, 69(1), 1159–1181.CrossRef Aliyu, F., Sheltami, T., Mahmoud, A., Al-Awami, L., & Yasar, A. (2021). Detecting Man-in-the-middle attack in fog computing for social media. CMC-Computers Materials Continua, 69(1), 1159–1181.CrossRef
32.
Zurück zum Zitat Noura, H., Salman, O., Chehab, A., & Couturier, R. (2019). Preserving data security in distributed fog computing. Ad Hoc Networks, 94, 1–16.CrossRef Noura, H., Salman, O., Chehab, A., & Couturier, R. (2019). Preserving data security in distributed fog computing. Ad Hoc Networks, 94, 1–16.CrossRef
33.
Zurück zum Zitat Muthumanickam, K., & Ilavarasan, E. (2020). PAM: process autnetication mechanism for protecting system services against malicious code attacks. Sādhanā, 45(141), 1–12. Muthumanickam, K., & Ilavarasan, E. (2020). PAM: process autnetication mechanism for protecting system services against malicious code attacks. Sādhanā, 45(141), 1–12.
Metadaten
Titel
Secure and novel authentication model for protecting data centers in fog environment
verfasst von
P. C. Senthil Mahesh
K. Muthumanickam
Publikationsdatum
30.12.2022
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 4/2023
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-022-03220-5

Weitere Artikel der Ausgabe 4/2023

Wireless Networks 4/2023 Zur Ausgabe

Neuer Inhalt