Abstract
The emergence of fog computing has witnessed a big role in initiating secure communication amongst users. Fog computing poses the ability to perform analysis, processing, and storage for a set of Internet of Things (IoT) devices. Several IoT solutions are devised by utilizing the fog nodes to alleviate IoT devices from complex computation and heavy processing. This paper proposes an authentication scheme using fog nodes to manage IoT devices by providing security without considering a trusted third party. The proposed authentication scheme employed the benefits of fog node deployment. The authentication scheme using fog node offers reliable verification between the data owners and the requester without depending on the third party users. The proposed authentication scheme using fog nodes effectively solved the problems of a single point of failure in the storage system and offers many benefits by increasing the throughput and reducing the cost. The proposed scheme considers several entities, like end-users, IoT devices, fog nodes, and smart contracts, which help to administrate the authentication using access policies. The proposed authentication scheme using fog node provided superior results than other methods with minimal memory value of 4009.083 KB, minimal time of 76.915 s, and maximal Packet delivery ratio (PDR) of 76.
Similar content being viewed by others
References
Almadhoun, R., Kadadha, M., Alhemeiri, M., Alshehhi, M. and Salah, K., “A user authentication scheme of iot devices using blockchain-enabled fog nodes”. In IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), (pp. 1–8), October 2018.
Gill, S. S., Garraghan, P., & Buyya, R. (2019). ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices. Journal of Systems and Software, 154, 125–138.
White, G., Nallur, V., & Clarke, S. (2017). Quality of service approaches in IoT: A systematic mapping. Journal of Systems and Software, 132, 186–203.
Gill, S. S., Chana, I., Singh, M., & Buyya, R. (2018). CHOPPER: an intelligent QoS-aware autonomic resource management approach for cloud computing. Cluster Computing, 21(2), 1203–1241.
Dong, Yunquan, Chen, Zhengchuan, & Fan, Pingyi. (2019). Timely two-way data exchanging in unilaterally powered fog computing systems. IEEE Access, 7, 21103–21117.
Wazid, M., Das, A. K., Kumar, N., & Vasilakos, A. V. (2019). Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems, 91, 475–492.
Ma, M., Shi, G., & Li, F. (2019). Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access, 7, 34045–34059.
Jia, X., He, D., Kumar, N., & Choo, K. K. R. (2019). Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Networks, 25, 4737–4750.
Thiyagarajan, K., & Manikandan, M. (2018). Fog assisted IoT based medical cyber system for cardiovascular diseases affected patients. Special Issue Advanced Algorithms for IoT Cloud computing and Cyber-Enabled Applications (ICAMMAET-ICTPACT2018), 31(12), 1–9.
Elliott, A., & Knight, S. (2016). Start Here: Engineering scalable access control systems. In Proceedings of the 21st ACM on symposium on access control models and technologies (pp. 113–124).
Xia, Qi, Sifah, Emmanuel Boateng, Smahi, Abla, Amofa, Sandro, & Zhang, Xiaosong. (2017). BBDS: Blockchain-based data sharing for electronic medical records in cloud environments. Information, 8(2), 44.
kulkarni, Yogesh R., & Senthil Murugan, T. (2019). Hybrid weed-particle swarm optimization algorithm and CMixture for data publishing. Multimedia Research (MR), 2(3), 33–42.
Swamy, S. M., Rajakumar B. R., and Valarmathi, I. R. (2013) Design of hybrid wind and photovoltaic power system using opposition-based genetic algorithm with cauchy mutation. In IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems, Chennai, India.
Ni, J., Lin, X., & Shen, X. S. (2018). Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE Journal on Selected Areas in Communications, 36(3), 644–657.
Mukherjee, B., Wang, S., Lu, W., Neupane, R. L., Dunn, D., Ren, Y., et al. (2018). Flexible IoT security middleware for end-to-end cloud–fog communication. Future Generation Computer Systems, 87, 688–703.
Wazid, M., Bagga, P., Das, A. K., Shetty, S., Rodrigues, J. J., & Park, Y. H. (2019). AKM-IoV: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet of Things Journal, 6(5), 8804–8817.
Idrus, S. Z. S., Cherrier, E., Rosenberger, C., & Schwartzmann, J. J. (2013). A review on authentication methods. Australian Journal of Basic and Applied Sciences, 7(5), 95–107.
Ali, G., Ahmad, N., Cao, Y., Asif, M., Cruickshank, H., & Ali, Q. (2019). Blockchain based permission delegation and access control in internet of things (BACI). Computers and Security, 86, 318–334.
Sandhu, R. S., & Samarati, P. (1994). Access control: Principle and practice. IEEE Communications Magazine, 32(9), 40–48.
Surendran, Priyanka, & Valsalan, Prajoona. (2018). Iot based breath sensor for mycobacterium tuberculosis. Journal of Advanced Research in Dynamical & Control Systems, 10(15), 670–674.
Valsalan, Ali Hussain Omar Baabood Prajoona, & Baomar, Tariq Ahmed Barham. (2020). IoT based Health Monitoring System. Journal of Critical Reviews, 7(4), 739–743.
Barbareschi, M., De Benedictis, A., La Montagna, E., Mazzeo, A., & Mazzocca, N. (2019). A PUF-based mutual authentication scheme for Cloud-Edges IoT systems. Future Generation Computer Systems., 101, 246–261.
Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.
Cirani, S., Picone, M., Gonizzi, P., Veltri, L., & Ferrari, G. (2014). Iot-oas: An oauth-based authorization service architecture for secure services in IoT scenarios. IEEE Sensors Journal, 15(2), 1224–1234.
Alonso, Á., Fernández, F., Marco, L., & Salvachúa, J. (2017). Iaacaas: Iot application-scoped access control as a service. Future Internet, 9(4), 64.
Borgohain, T., Borgohain, A., Kumar, U. and Sanyal, S., “Authentication systems in internet of things”, arXiv preprint arXiv:1502.00870, 2015.
Liu, Hong, Zhang, Yan, & Yang, Tao. (2018). Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing. Security and privacy of connected vehicular cloudcomputing. IEEE Network, 32(3), 78–83.
AmitSahai, and Brent Waters (May 2005). Fuzzy Identity-Based Encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, (pp. 457–473).
Bai, J. and Hao, R. (2019) Comment on “Privacy-preserving public auditing for non-manager group shared data. The Journal of Supercomputing, 1–15.
Wang, Shangping, Zhang, Yinglong, & Zhang, Yaling. (2018). A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access, 6, 38437–38450.
Kahvazadeh, S., Masip-Bruin, X., Diaz, R., Marín-Tordera, E., Jurnet, A. and Garcia, J. (2018). Towards an efficient key management and authentication strategy for combined fog-to-cloud continuum systems”, In 3rd Cloudification of the Internet of Things (CIoT), (pp. 1–7).
Yassine, A., Singh, S., Hossain, M. S., & Muhammad, G. (2019). IoT big data analytics for smart homes with fog and cloud computing. Future Generation Computer Systems, 91, 563–573.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Pallavi, K.N., Ravi Kumar, V. Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment. Wireless Pers Commun 116, 3039–3060 (2021). https://doi.org/10.1007/s11277-020-07834-w
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07834-w