Skip to main content
Log in

TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

A mechanism of fog computing environment is employed in order to enhance the cloud computing services toward the edge devices in a range of locations with low latency. A fog computing environment is effective when compared to cloud computing for providing communication between various edge devices such as smart devices and mobile devices used by users in the same location. Even though fog servicing extends the best services of cloud computing, it also suffers from a set of security threats like authentication, key management, data privacy and trust management. Authentication with effective key management between edge devices is the most pressing security issue in fog computing. This paper proposes an effective two-way authentication between edge devices with key management in fog computing environments (TAKM-FC). The edge nodes are the user’s mobile devices and set of smart devices controlled by the fog server. To improve the proposed authentication system, we have made use of techniques like fuzzy extractor and one-way hash with cryptographic primitives. The proposed TAKM-FC scheme is validated mathematically based on the ROR model and then verified using the ProVerif tool. The TAKM-FC scheme has been evaluated using iFogSim to measure the performance parameters like throughput, end-to-end delay, packet loss, energy consumption and network usage. The overhead analysis of the proposed scheme is carried out and shows that the computation cost, communication cost and storage cost are improved by 11–21%, 8–19% and 6–13%, respectively, compared to existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no datasets were generated during the current study.

References

  1. Namasudra S, Roy P (2018) PpBAC. J Organ End User Comput 30:14–31. https://doi.org/10.4018/joeuc.2018100102

    Article  Google Scholar 

  2. Xiong H, Wang Y, Li W, Chen C-M (2019) Flexible, efficient, and secure access delegation in cloud computing. ACM Trans Manag Inf Syst 10:1–20. https://doi.org/10.1145/3318212

    Article  Google Scholar 

  3. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on mobile cloud computing-MCC’12. https://doi.org/10.1145/2342509.2342513

  4. Singh SP, Nayyar A, Kumar R (2019) Sharma A, Fog computing: from architecture to edge computing and big data processing. J Supercomput 75:2070–2105. https://doi.org/10.1007/s11227-018-2701-2

    Article  Google Scholar 

  5. Manvi SS, Gowda NC (2019) Trust management in fog computing. Appl Integr Tech Methods Distrib Syst Technol. https://doi.org/10.4018/978-1-5225-8295-3.ch002

    Article  Google Scholar 

  6. Murtaza MH, Tahir H, Tahir S, Alizai ZA, Riaz Q, Hussain M (2022) A portable hardware security module and cryptographic key generator. J Inf Secur Appl 70:103332. https://doi.org/10.1016/j.jisa.2022.103332

    Article  Google Scholar 

  7. Mehdi M, Ajani MT, Tahir H, Tahir S, Alizai Z, Khan F, Riaz Q, Hussain M (2021) PUF-based key generation scheme for secure group communication using MEMS. Electronics 10:1691. https://doi.org/10.3390/electronics10141691

    Article  Google Scholar 

  8. Stojmenovic I, Wen S (2014) The fog computing paradigm scenarios and security issues. Ann Comput Sci Inf Syst. https://doi.org/10.15439/2014f503

    Article  Google Scholar 

  9. Kaliya N, Pawar D (2023) Unboxing fog security: a review of fog security and authentication mechanisms. Computing. https://doi.org/10.1007/s00607-023-01208-3

    Article  Google Scholar 

  10. Al-Mekhlafi ZG, Al-Shareeda MA, Manickam S, Mohammed BA, Alreshidi A, Alazmi M, Alshudukhi JS, Alsaffar M, Rassem TH (2023) Efficient authentication scheme for 5G-enabled vehicular networks using fog computing. Sensors 23:3543. https://doi.org/10.3390/s23073543

    Article  ADS  PubMed  PubMed Central  Google Scholar 

  11. Luqman M, Faridi AR (2023) Authentication of fog-assisted IoT networks using advanced encryption credibility approach with modified Diffie–Hellman encryption. Concurr Comput. https://doi.org/10.1002/cpe.7742

    Article  Google Scholar 

  12. Saravanakumar S, Saravanan T (2023) Secure personal authentication in fog devices via multimodal rank-level fusion. Concurr Comput. https://doi.org/10.1002/cpe.7673

    Article  Google Scholar 

  13. Loffi L, Westphall CM, Grudtner LD, Westphall CB (2021) Mutual authentication with multi-factor in IoT-Fog-Cloud environment. J Netw Comput Appl 176:102932. https://doi.org/10.1016/j.jnca.2020.102932

    Article  Google Scholar 

  14. Mo J, Hu Z, Chen H, Shen W (2019) An efficient and provably secure anonymous user authentication and key agreement for mobile cloud computing. Wirel Commun Mob Comput 2019:1–12. https://doi.org/10.1155/2019/4520685

    Article  Google Scholar 

  15. Kumar P, Braeken A, Gurtov A, Iinatti J, Ha PH (2017) Anonymous secure framework in connected smart home environments. IEEE Trans Inform Forensic Secur 12:968–979. https://doi.org/10.1109/tifs.2016.2647225

    Article  Google Scholar 

  16. Braeken A, Kumar P, Liyanage M, Hue TTK (2017) An efficient anonymous authentication protocol in multiple server communication networks (EAAM). J Supercomput 74:1695–1714. https://doi.org/10.1007/s11227-017-2190-8

    Article  Google Scholar 

  17. Odelu V, Das AK, Wazid M, Conti M (2016) Provably Secure authenticated key agreement scheme for smart grid. IEEE Trans Smart Grid. https://doi.org/10.1109/tsg.2016.2602282

    Article  Google Scholar 

  18. Guo J, Du Y, Zhang Y, Li M (2021) A provably secure ECC-based access and handover authentication protocol for space information networks. J Netw Comput Appl 193:103183. https://doi.org/10.1016/j.jnca.2021.103183

    Article  Google Scholar 

  19. Al Hamid HA, Rahman SMM, Hossain MS, Almogren A, Alamri A (2017) A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5:22313–22328. https://doi.org/10.1109/access.2017.2757844

    Article  Google Scholar 

  20. Ke C, Zhu Z, Xiao F, Huang Z, Meng Y (2022) SDN-based privacy and functional authentication scheme for fog nodes of smart healthcare. IEEE Internet Things J. https://doi.org/10.1109/jiot.2022.3161935

    Article  Google Scholar 

  21. Wu TY, Lee Z, Yang L (2021) Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks. J Supercomput 77:6992–7020. https://doi.org/10.1007/s11227-020-03548-9

    Article  Google Scholar 

  22. Chen C-M, Huang Y, Wang K-H, Kumari S, Wu M-E (2020) A secure authenticated and key exchange scheme for fog computing. Enterprise Information Systems 15:1200–1215. https://doi.org/10.1080/17517575.2020.1712746

    Article  ADS  Google Scholar 

  23. Tiwari D, Chaturvedi GK, Gangadharan GR (2019) ACDAS: Authenticated controlled data access and sharing scheme for cloud storage. Int J Commun Syst 32:e4072. https://doi.org/10.1002/dac.4072

    Article  Google Scholar 

  24. Akram MA, Ghaffar Z, Mahmood K, Kumari S, Agarwal K, Chen C-M (2020) An anonymous authenticated key-agreement scheme for multi-server infrastructure. Hum Cent Comput Inf Sci. https://doi.org/10.1186/s13673-020-00227-9

    Article  Google Scholar 

  25. Liu C-L, Tsai W-J, Chang T-Y, Liu T-M (2018) Ephemeral-secret-leakage secure ID based three-party authenticated key agreement protocol for mobile distributed computing environments. Symmetry 10:84. https://doi.org/10.3390/sym10040084

    Article  ADS  Google Scholar 

  26. Patonico S, Braeken A, Steenhaut K (2019) Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model. Wireless Netw. https://doi.org/10.1007/s11276-019-02084-6

    Article  Google Scholar 

  27. Wu TY, Meng Q, Yang L, Guo X, Kumari S (2022) A provably secure lightweight authentication protocol in mobile edge computing environments. J Supercomput 78:13893–13914. https://doi.org/10.1007/s11227-022-04411-9

    Article  Google Scholar 

  28. Alsahlani AYF, Popa A (2021) LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment. J Netw Comput Appl 192:103177. https://doi.org/10.1016/j.jnca.2021.103177

    Article  Google Scholar 

  29. Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Futur Gener Comput Syst 91:475–492. https://doi.org/10.1016/j.future.2018.09.017

    Article  Google Scholar 

  30. Yadav AK, Braeken A, Misra M (2023) Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing. J Supercomput. https://doi.org/10.1007/s11227-023-05064-y

    Article  Google Scholar 

  31. Yan X, Ma M (2021) A lightweight and secure handover authentication scheme for 5G network using neighbour base stations. J Netw Comput Appl 193:103204. https://doi.org/10.1016/j.jnca.2021.103204

    Article  Google Scholar 

  32. Wazid M, Bagga P, Das AK, Shetty S, Rodrigues JJPC, Park Y (2019) AKMIoV: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J 6:8804–8817. https://doi.org/10.1109/jiot.2019.2923611

    Article  Google Scholar 

  33. Ali HS, Sridevi R (2022) Credential-based authentication mechanism for IoT devices in fog-cloud computing. ICT Anal Appl. https://doi.org/10.1007/978-981-16-5655-2_30

    Article  Google Scholar 

  34. Lu S, Li X (2021) Quantum-resistant lightweight authentication and key agreement protocol for fog-based microgrids. IEEE Access 9:27588–27600. https://doi.org/10.1109/access.2021.3058180

    Article  Google Scholar 

  35. Hamada M, Salem SA, Salem FM (2022) LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments. Ain Shams Eng J 13:101752. https://doi.org/10.1016/j.asej.2022.101752

    Article  Google Scholar 

  36. Chatterjee U, Ray S, Khan MK, Dasgupta M, Chen C-M (2022) An ECC based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing. Computing 104:1359–1395. https://doi.org/10.1007/s00607-022-01055-8

    Article  Google Scholar 

  37. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inform Theory 29:198–208. https://doi.org/10.1109/tit.1983.1056650

    Article  MathSciNet  Google Scholar 

  38. Das AK, Sengupta I (2008) An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials. In: 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE ’08). https://doi.org/10.1109/comswa.2008.4554370

  39. Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of the advances in cryptology (Eurocrypt’04), LNCS, vol 3027

  40. Wang D, He D, Wang P, Chu C-H (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Dependable Secure Comput 12:428–442. https://doi.org/10.1109/tdsc.2014.2355850

    Article  Google Scholar 

  41. Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36. https://doi.org/10.1145/77648.77649

    Article  Google Scholar 

  42. Wazid M, Das AK, Odelu V, Kumar N, Susilo W (2020) Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Dependable Secure Comput 17:391–406. https://doi.org/10.1109/tdsc.2017.2764083

    Article  Google Scholar 

  43. Wu L, Wang J, Choo K-KR, He D (2019) Secure key agreement and key protection for mobile device user authentication. IEEE Trans Inform Forensics Secur 14:319–330. https://doi.org/10.1109/tifs.2018.2850299

    Article  Google Scholar 

  44. Blanchet B, Smyth B, Cheval V, Sylvestre M (2018) ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial. p 05–16

  45. Awaisi KS, Abbas A, Khan SU, Mahmud R, Buyya R (2021) Simulating fog computing applications using iFogSim toolkit. Mob Edge Comput. https://doi.org/10.1007/978-3-030-69893-5_22

    Article  Google Scholar 

Download references

Funding

The authors did not receive any funds, grants, or other support for conducting this study, preparation of this manuscript, and submitting the work.

Author information

Authors and Affiliations

Authors

Contributions

NCG-Conceptualization, Methodology, Data curation, Experimentation, Writing—Original draft preparation. SSM-Conceptualization, Methodology, Visualization, Investigation, Validation, Supervision. BMA-Methodology, Investigation, Validation, Writing—Reviewing and Editing, Supervision. RB-Validation, Writing—Reviewing and Editing.

Corresponding author

Correspondence to Naveen Chandra Gowda.

Ethics declarations

Conflict of interest

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. The authors have no conflict of interest to declare that are relevant to the content of this article.

Ethical approval

Ethical approval is not required and not applicable to publish this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gowda, N.C., Manvi, S.S., Malakreddy, A.B. et al. TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments. J Supercomput 80, 6855–6890 (2024). https://doi.org/10.1007/s11227-023-05712-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05712-3

Keywords

Navigation