Abstract
A mechanism of fog computing environment is employed in order to enhance the cloud computing services toward the edge devices in a range of locations with low latency. A fog computing environment is effective when compared to cloud computing for providing communication between various edge devices such as smart devices and mobile devices used by users in the same location. Even though fog servicing extends the best services of cloud computing, it also suffers from a set of security threats like authentication, key management, data privacy and trust management. Authentication with effective key management between edge devices is the most pressing security issue in fog computing. This paper proposes an effective two-way authentication between edge devices with key management in fog computing environments (TAKM-FC). The edge nodes are the user’s mobile devices and set of smart devices controlled by the fog server. To improve the proposed authentication system, we have made use of techniques like fuzzy extractor and one-way hash with cryptographic primitives. The proposed TAKM-FC scheme is validated mathematically based on the ROR model and then verified using the ProVerif tool. The TAKM-FC scheme has been evaluated using iFogSim to measure the performance parameters like throughput, end-to-end delay, packet loss, energy consumption and network usage. The overhead analysis of the proposed scheme is carried out and shows that the computation cost, communication cost and storage cost are improved by 11–21%, 8–19% and 6–13%, respectively, compared to existing schemes.




















Similar content being viewed by others
Data availability
Data sharing is not applicable to this article as no datasets were generated during the current study.
References
Namasudra S, Roy P (2018) PpBAC. J Organ End User Comput 30:14–31. https://doi.org/10.4018/joeuc.2018100102
Xiong H, Wang Y, Li W, Chen C-M (2019) Flexible, efficient, and secure access delegation in cloud computing. ACM Trans Manag Inf Syst 10:1–20. https://doi.org/10.1145/3318212
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on mobile cloud computing-MCC’12. https://doi.org/10.1145/2342509.2342513
Singh SP, Nayyar A, Kumar R (2019) Sharma A, Fog computing: from architecture to edge computing and big data processing. J Supercomput 75:2070–2105. https://doi.org/10.1007/s11227-018-2701-2
Manvi SS, Gowda NC (2019) Trust management in fog computing. Appl Integr Tech Methods Distrib Syst Technol. https://doi.org/10.4018/978-1-5225-8295-3.ch002
Murtaza MH, Tahir H, Tahir S, Alizai ZA, Riaz Q, Hussain M (2022) A portable hardware security module and cryptographic key generator. J Inf Secur Appl 70:103332. https://doi.org/10.1016/j.jisa.2022.103332
Mehdi M, Ajani MT, Tahir H, Tahir S, Alizai Z, Khan F, Riaz Q, Hussain M (2021) PUF-based key generation scheme for secure group communication using MEMS. Electronics 10:1691. https://doi.org/10.3390/electronics10141691
Stojmenovic I, Wen S (2014) The fog computing paradigm scenarios and security issues. Ann Comput Sci Inf Syst. https://doi.org/10.15439/2014f503
Kaliya N, Pawar D (2023) Unboxing fog security: a review of fog security and authentication mechanisms. Computing. https://doi.org/10.1007/s00607-023-01208-3
Al-Mekhlafi ZG, Al-Shareeda MA, Manickam S, Mohammed BA, Alreshidi A, Alazmi M, Alshudukhi JS, Alsaffar M, Rassem TH (2023) Efficient authentication scheme for 5G-enabled vehicular networks using fog computing. Sensors 23:3543. https://doi.org/10.3390/s23073543
Luqman M, Faridi AR (2023) Authentication of fog-assisted IoT networks using advanced encryption credibility approach with modified Diffie–Hellman encryption. Concurr Comput. https://doi.org/10.1002/cpe.7742
Saravanakumar S, Saravanan T (2023) Secure personal authentication in fog devices via multimodal rank-level fusion. Concurr Comput. https://doi.org/10.1002/cpe.7673
Loffi L, Westphall CM, Grudtner LD, Westphall CB (2021) Mutual authentication with multi-factor in IoT-Fog-Cloud environment. J Netw Comput Appl 176:102932. https://doi.org/10.1016/j.jnca.2020.102932
Mo J, Hu Z, Chen H, Shen W (2019) An efficient and provably secure anonymous user authentication and key agreement for mobile cloud computing. Wirel Commun Mob Comput 2019:1–12. https://doi.org/10.1155/2019/4520685
Kumar P, Braeken A, Gurtov A, Iinatti J, Ha PH (2017) Anonymous secure framework in connected smart home environments. IEEE Trans Inform Forensic Secur 12:968–979. https://doi.org/10.1109/tifs.2016.2647225
Braeken A, Kumar P, Liyanage M, Hue TTK (2017) An efficient anonymous authentication protocol in multiple server communication networks (EAAM). J Supercomput 74:1695–1714. https://doi.org/10.1007/s11227-017-2190-8
Odelu V, Das AK, Wazid M, Conti M (2016) Provably Secure authenticated key agreement scheme for smart grid. IEEE Trans Smart Grid. https://doi.org/10.1109/tsg.2016.2602282
Guo J, Du Y, Zhang Y, Li M (2021) A provably secure ECC-based access and handover authentication protocol for space information networks. J Netw Comput Appl 193:103183. https://doi.org/10.1016/j.jnca.2021.103183
Al Hamid HA, Rahman SMM, Hossain MS, Almogren A, Alamri A (2017) A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5:22313–22328. https://doi.org/10.1109/access.2017.2757844
Ke C, Zhu Z, Xiao F, Huang Z, Meng Y (2022) SDN-based privacy and functional authentication scheme for fog nodes of smart healthcare. IEEE Internet Things J. https://doi.org/10.1109/jiot.2022.3161935
Wu TY, Lee Z, Yang L (2021) Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks. J Supercomput 77:6992–7020. https://doi.org/10.1007/s11227-020-03548-9
Chen C-M, Huang Y, Wang K-H, Kumari S, Wu M-E (2020) A secure authenticated and key exchange scheme for fog computing. Enterprise Information Systems 15:1200–1215. https://doi.org/10.1080/17517575.2020.1712746
Tiwari D, Chaturvedi GK, Gangadharan GR (2019) ACDAS: Authenticated controlled data access and sharing scheme for cloud storage. Int J Commun Syst 32:e4072. https://doi.org/10.1002/dac.4072
Akram MA, Ghaffar Z, Mahmood K, Kumari S, Agarwal K, Chen C-M (2020) An anonymous authenticated key-agreement scheme for multi-server infrastructure. Hum Cent Comput Inf Sci. https://doi.org/10.1186/s13673-020-00227-9
Liu C-L, Tsai W-J, Chang T-Y, Liu T-M (2018) Ephemeral-secret-leakage secure ID based three-party authenticated key agreement protocol for mobile distributed computing environments. Symmetry 10:84. https://doi.org/10.3390/sym10040084
Patonico S, Braeken A, Steenhaut K (2019) Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model. Wireless Netw. https://doi.org/10.1007/s11276-019-02084-6
Wu TY, Meng Q, Yang L, Guo X, Kumari S (2022) A provably secure lightweight authentication protocol in mobile edge computing environments. J Supercomput 78:13893–13914. https://doi.org/10.1007/s11227-022-04411-9
Alsahlani AYF, Popa A (2021) LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment. J Netw Comput Appl 192:103177. https://doi.org/10.1016/j.jnca.2021.103177
Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Futur Gener Comput Syst 91:475–492. https://doi.org/10.1016/j.future.2018.09.017
Yadav AK, Braeken A, Misra M (2023) Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing. J Supercomput. https://doi.org/10.1007/s11227-023-05064-y
Yan X, Ma M (2021) A lightweight and secure handover authentication scheme for 5G network using neighbour base stations. J Netw Comput Appl 193:103204. https://doi.org/10.1016/j.jnca.2021.103204
Wazid M, Bagga P, Das AK, Shetty S, Rodrigues JJPC, Park Y (2019) AKMIoV: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J 6:8804–8817. https://doi.org/10.1109/jiot.2019.2923611
Ali HS, Sridevi R (2022) Credential-based authentication mechanism for IoT devices in fog-cloud computing. ICT Anal Appl. https://doi.org/10.1007/978-981-16-5655-2_30
Lu S, Li X (2021) Quantum-resistant lightweight authentication and key agreement protocol for fog-based microgrids. IEEE Access 9:27588–27600. https://doi.org/10.1109/access.2021.3058180
Hamada M, Salem SA, Salem FM (2022) LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments. Ain Shams Eng J 13:101752. https://doi.org/10.1016/j.asej.2022.101752
Chatterjee U, Ray S, Khan MK, Dasgupta M, Chen C-M (2022) An ECC based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing. Computing 104:1359–1395. https://doi.org/10.1007/s00607-022-01055-8
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inform Theory 29:198–208. https://doi.org/10.1109/tit.1983.1056650
Das AK, Sengupta I (2008) An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials. In: 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE ’08). https://doi.org/10.1109/comswa.2008.4554370
Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of the advances in cryptology (Eurocrypt’04), LNCS, vol 3027
Wang D, He D, Wang P, Chu C-H (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Dependable Secure Comput 12:428–442. https://doi.org/10.1109/tdsc.2014.2355850
Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36. https://doi.org/10.1145/77648.77649
Wazid M, Das AK, Odelu V, Kumar N, Susilo W (2020) Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Dependable Secure Comput 17:391–406. https://doi.org/10.1109/tdsc.2017.2764083
Wu L, Wang J, Choo K-KR, He D (2019) Secure key agreement and key protection for mobile device user authentication. IEEE Trans Inform Forensics Secur 14:319–330. https://doi.org/10.1109/tifs.2018.2850299
Blanchet B, Smyth B, Cheval V, Sylvestre M (2018) ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial. p 05–16
Awaisi KS, Abbas A, Khan SU, Mahmud R, Buyya R (2021) Simulating fog computing applications using iFogSim toolkit. Mob Edge Comput. https://doi.org/10.1007/978-3-030-69893-5_22
Funding
The authors did not receive any funds, grants, or other support for conducting this study, preparation of this manuscript, and submitting the work.
Author information
Authors and Affiliations
Contributions
NCG-Conceptualization, Methodology, Data curation, Experimentation, Writing—Original draft preparation. SSM-Conceptualization, Methodology, Visualization, Investigation, Validation, Supervision. BMA-Methodology, Investigation, Validation, Writing—Reviewing and Editing, Supervision. RB-Validation, Writing—Reviewing and Editing.
Corresponding author
Ethics declarations
Conflict of interest
All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. The authors have no conflict of interest to declare that are relevant to the content of this article.
Ethical approval
Ethical approval is not required and not applicable to publish this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Gowda, N.C., Manvi, S.S., Malakreddy, A.B. et al. TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments. J Supercomput 80, 6855–6890 (2024). https://doi.org/10.1007/s11227-023-05712-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05712-3