TY - GEN
T1 - Mutual authentication and authorized data access between fog and user based on blockchain technology
AU - Arun, M.
AU - Balamurali, S.
AU - Rawal, Bharat S.
AU - Duan, Qiang
AU - Kumar, R. Lakshmana
AU - Balamurugan, Balusamy
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/7
Y1 - 2020/7
N2 - One of the essential challenges to Fog computing security is authentication between service offering Fog servers and Fog users. This security confirmation is critical as a large number of users are offered services in Fog Computing. To address this challenge, in this paper, we first propose an efficient mutual authentication method between Clouds-Fogs-Edges. The solution enables authentication between edge users and the Fog servers that newly enter the system. The method makes the Fog servers to store one secret key per user and the user performs hash-based encryptions/decryptions. The proposed system is supported by Blockchain technique to achieve data integrity when confidential data are transferred between edge devices and nodes. The transactions between the nodes are recorded in the blocks which are hashed so that all edge and fog nodes are encircled by a secured system. Whenever any malicious edge server enters the network, it is identified based on ledger maintained at the nodes. The security and performance analysis shows the scheme is applicable for the Fog computing environment.
AB - One of the essential challenges to Fog computing security is authentication between service offering Fog servers and Fog users. This security confirmation is critical as a large number of users are offered services in Fog Computing. To address this challenge, in this paper, we first propose an efficient mutual authentication method between Clouds-Fogs-Edges. The solution enables authentication between edge users and the Fog servers that newly enter the system. The method makes the Fog servers to store one secret key per user and the user performs hash-based encryptions/decryptions. The proposed system is supported by Blockchain technique to achieve data integrity when confidential data are transferred between edge devices and nodes. The transactions between the nodes are recorded in the blocks which are hashed so that all edge and fog nodes are encircled by a secured system. Whenever any malicious edge server enters the network, it is identified based on ledger maintained at the nodes. The security and performance analysis shows the scheme is applicable for the Fog computing environment.
UR - http://www.scopus.com/inward/record.url?scp=85091506980&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85091506980&partnerID=8YFLogxK
U2 - 10.1109/INFOCOMWKSHPS50562.2020.9162915
DO - 10.1109/INFOCOMWKSHPS50562.2020.9162915
M3 - Conference contribution
AN - SCOPUS:85091506980
T3 - IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020
SP - 37
EP - 42
BT - IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2020 IEEE INFOCOM Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020
Y2 - 6 July 2020 through 9 July 2020
ER -