当前位置: X-MOL 学术Comput. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain
Computer Communications ( IF 6 ) Pub Date : 2020-09-04 , DOI: 10.1016/j.comcom.2020.08.021
Abdullah Al-Noman Patwary , Anmin Fu , Sudheer Kumar Battula , Ranesh Kumar Naha , Saurabh Garg , Aniket Mahanti

Fog computing is an emerging computing paradigm which expands cloud-based computing services near the network edge. With this new computing paradigm, new challenges arise in terms of security and privacy. These concerns are due to the distributed ownership of Fog devices. Because of the large scale distributed nature of devices at the Fog layer, secure authentication for communication among these devices is a major challenge. The traditional authentication methods (password-based, certificate-based and biometric-based) are not directly applicable due to the unique architecture and characteristics of the Fog. Moreover, the traditional authentication methods consume significantly more computation power and incur high latency, and this does not meet the key requirements of the Fog. To fill this gap, this article proposes a secure decentralised location-based device to device (D2D) authentication model in which Fog devices can mutually authenticate each other at the Fog layer by using Blockchain. We considered an Ethereum Blockchain platform for the Fog device registration, authentication, attestation and data storage. We presented the overall system architecture, various participants and their transactions and message interaction between the participants. We validated the proposed model by comparing it with the existing method; results showed that the proposed authentication mechanism was efficient and secure. From the performance evaluation, it was found that the proposed method is computationally efficient and secure in a highly distributed Fog network.



中文翻译:

FogAuthChain:使用区块链的雾计算环境中的基于位置的安全身份验证方案

雾计算是一种新兴的计算范例,可在网络边缘附近扩展基于云的计算服务。有了这种新的计算范例,在安全性和隐私性方面出现了新的挑战。这些担忧是由于Fog设备的分布式所有权所致。由于设备在Fog层具有大规模的分布式特性,因此在这些设备之间进行通信的安全身份验证是一项重大挑战。由于雾的独特架构和特性,传统的身份验证方法(基于密码,基于证书和基于生物识别)无法直接应用。此外,传统的身份验证方法会消耗更多的计算能力,并会导致较高的延迟,这不能满足Fog的关键要求。为了填补这一空白,本文提出了一种安全的基于位置的分散式设备到设备(D2D)身份验证模型,其中Fog设备可以通过使用区块链在Fog层上相互进行身份验证。我们考虑了一个用于Fog设备注册,身份验证,证明和数据存储的以太坊区块链平台。我们介绍了整个系统架构,各种参与者以及他们之间的交易以及参与者之间的消息交互。通过与现有方法进行比较,我们验证了所提出的模型;结果表明,所提出的认证机制是有效且安全的。从性能评估中发现,该方法在高度分布的Fog网络中计算效率高且安全。

更新日期:2020-09-05
down
wechat
bug