Skip to main content
Log in

Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The emergence of fog computing has witnessed a big role in initiating secure communication amongst users. Fog computing poses the ability to perform analysis, processing, and storage for a set of Internet of Things (IoT) devices. Several IoT solutions are devised by utilizing the fog nodes to alleviate IoT devices from complex computation and heavy processing. This paper proposes an authentication scheme using fog nodes to manage IoT devices by providing security without considering a trusted third party. The proposed authentication scheme employed the benefits of fog node deployment. The authentication scheme using fog node offers reliable verification between the data owners and the requester without depending on the third party users. The proposed authentication scheme using fog nodes effectively solved the problems of a single point of failure in the storage system and offers many benefits by increasing the throughput and reducing the cost. The proposed scheme considers several entities, like end-users, IoT devices, fog nodes, and smart contracts, which help to administrate the authentication using access policies. The proposed authentication scheme using fog node provided superior results than other methods with minimal memory value of 4009.083 KB, minimal time of 76.915 s, and maximal Packet delivery ratio (PDR) of 76.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Almadhoun, R., Kadadha, M., Alhemeiri, M., Alshehhi, M. and Salah, K., “A user authentication scheme of iot devices using blockchain-enabled fog nodes”. In IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), (pp. 1–8), October 2018.

  2. Gill, S. S., Garraghan, P., & Buyya, R. (2019). ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices. Journal of Systems and Software, 154, 125–138.

    Article  Google Scholar 

  3. White, G., Nallur, V., & Clarke, S. (2017). Quality of service approaches in IoT: A systematic mapping. Journal of Systems and Software, 132, 186–203.

    Article  Google Scholar 

  4. Gill, S. S., Chana, I., Singh, M., & Buyya, R. (2018). CHOPPER: an intelligent QoS-aware autonomic resource management approach for cloud computing. Cluster Computing, 21(2), 1203–1241.

    Article  Google Scholar 

  5. Dong, Yunquan, Chen, Zhengchuan, & Fan, Pingyi. (2019). Timely two-way data exchanging in unilaterally powered fog computing systems. IEEE Access, 7, 21103–21117.

    Article  Google Scholar 

  6. Wazid, M., Das, A. K., Kumar, N., & Vasilakos, A. V. (2019). Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems, 91, 475–492.

    Article  Google Scholar 

  7. Ma, M., Shi, G., & Li, F. (2019). Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access, 7, 34045–34059.

    Article  Google Scholar 

  8. Jia, X., He, D., Kumar, N., & Choo, K. K. R. (2019). Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Networks, 25, 4737–4750.

    Article  Google Scholar 

  9. Thiyagarajan, K., & Manikandan, M. (2018). Fog assisted IoT based medical cyber system for cardiovascular diseases affected patients. Special Issue Advanced Algorithms for IoT Cloud computing and Cyber-Enabled Applications (ICAMMAET-ICTPACT2018), 31(12), 1–9.

    Google Scholar 

  10. Elliott, A., & Knight, S. (2016). Start Here: Engineering scalable access control systems. In Proceedings of the 21st ACM on symposium on access control models and technologies (pp. 113–124).

  11. Xia, Qi, Sifah, Emmanuel Boateng, Smahi, Abla, Amofa, Sandro, & Zhang, Xiaosong. (2017). BBDS: Blockchain-based data sharing for electronic medical records in cloud environments. Information, 8(2), 44.

    Article  Google Scholar 

  12. kulkarni, Yogesh R., & Senthil Murugan, T. (2019). Hybrid weed-particle swarm optimization algorithm and CMixture for data publishing. Multimedia Research (MR), 2(3), 33–42.

    Google Scholar 

  13. Swamy, S. M., Rajakumar B. R., and Valarmathi, I. R. (2013) Design of hybrid wind and photovoltaic power system using opposition-based genetic algorithm with cauchy mutation. In IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems, Chennai, India.

  14. Ni, J., Lin, X., & Shen, X. S. (2018). Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE Journal on Selected Areas in Communications, 36(3), 644–657.

    Article  Google Scholar 

  15. Mukherjee, B., Wang, S., Lu, W., Neupane, R. L., Dunn, D., Ren, Y., et al. (2018). Flexible IoT security middleware for end-to-end cloud–fog communication. Future Generation Computer Systems, 87, 688–703.

    Article  Google Scholar 

  16. Wazid, M., Bagga, P., Das, A. K., Shetty, S., Rodrigues, J. J., & Park, Y. H. (2019). AKM-IoV: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet of Things Journal, 6(5), 8804–8817.

    Article  Google Scholar 

  17. Idrus, S. Z. S., Cherrier, E., Rosenberger, C., & Schwartzmann, J. J. (2013). A review on authentication methods. Australian Journal of Basic and Applied Sciences, 7(5), 95–107.

    Google Scholar 

  18. Ali, G., Ahmad, N., Cao, Y., Asif, M., Cruickshank, H., & Ali, Q. (2019). Blockchain based permission delegation and access control in internet of things (BACI). Computers and Security, 86, 318–334.

    Article  Google Scholar 

  19. Sandhu, R. S., & Samarati, P. (1994). Access control: Principle and practice. IEEE Communications Magazine, 32(9), 40–48.

    Article  Google Scholar 

  20. Surendran, Priyanka, & Valsalan, Prajoona. (2018). Iot based breath sensor for mycobacterium tuberculosis. Journal of Advanced Research in Dynamical & Control Systems, 10(15), 670–674.

    Google Scholar 

  21. Valsalan, Ali Hussain Omar Baabood Prajoona, & Baomar, Tariq Ahmed Barham. (2020). IoT based Health Monitoring System. Journal of Critical Reviews, 7(4), 739–743.

    Google Scholar 

  22. Barbareschi, M., De Benedictis, A., La Montagna, E., Mazzeo, A., & Mazzocca, N. (2019). A PUF-based mutual authentication scheme for Cloud-Edges IoT systems. Future Generation Computer Systems., 101, 246–261.

    Article  Google Scholar 

  23. Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.

    Article  Google Scholar 

  24. Cirani, S., Picone, M., Gonizzi, P., Veltri, L., & Ferrari, G. (2014). Iot-oas: An oauth-based authorization service architecture for secure services in IoT scenarios. IEEE Sensors Journal, 15(2), 1224–1234.

    Article  Google Scholar 

  25. Alonso, Á., Fernández, F., Marco, L., & Salvachúa, J. (2017). Iaacaas: Iot application-scoped access control as a service. Future Internet, 9(4), 64.

    Article  Google Scholar 

  26. Borgohain, T., Borgohain, A., Kumar, U. and Sanyal, S., “Authentication systems in internet of things”, arXiv preprint arXiv:1502.00870, 2015.

  27. Liu, Hong, Zhang, Yan, & Yang, Tao. (2018). Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing. Security and privacy of connected vehicular cloudcomputing. IEEE Network, 32(3), 78–83.

    Article  Google Scholar 

  28. AmitSahai, and Brent Waters (May 2005). Fuzzy Identity-Based Encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, (pp. 457–473).

  29. Bai, J. and Hao, R. (2019) Comment on “Privacy-preserving public auditing for non-manager group shared data. The Journal of Supercomputing, 1–15.

  30. Wang, Shangping, Zhang, Yinglong, & Zhang, Yaling. (2018). A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access, 6, 38437–38450.

    Article  Google Scholar 

  31. Kahvazadeh, S., Masip-Bruin, X., Diaz, R., Marín-Tordera, E., Jurnet, A. and Garcia, J. (2018). Towards an efficient key management and authentication strategy for combined fog-to-cloud continuum systems”, In 3rd Cloudification of the Internet of Things (CIoT), (pp. 1–7).

  32. Yassine, A., Singh, S., Hossain, M. S., & Muhammad, G. (2019). IoT big data analytics for smart homes with fog and cloud computing. Future Generation Computer Systems, 91, 563–573.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. N. Pallavi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pallavi, K.N., Ravi Kumar, V. Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment. Wireless Pers Commun 116, 3039–3060 (2021). https://doi.org/10.1007/s11277-020-07834-w

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07834-w

Keywords

Navigation