首页> 外文期刊>Future generation computer systems >Design of secure key management and user authentication scheme for fog computing services
【24h】

Design of secure key management and user authentication scheme for fog computing services

机译:雾计算服务的安全密钥管理和用户认证方案设计

获取原文
获取原文并翻译 | 示例
           

摘要

Fog computing (fog networking) is known as a decentralized computing infrastructure in which data, applications, compute as well as data storage are scattered in the most logical and efficient place among the data source (i.e., smart devices) and the cloud. It gives better services than cloud computing because it has better performance with reasonably low cost. Since the cloud computing has security and privacy issues, and fog computing is an extension of cloud computing, it is therefore obvious that fog computing will inherit those security and privacy issues from cloud computing. In this paper, we design a new secure key management and user authentication scheme for fog computing environment, called SAKA-FC. SAKA-FC is efficient as it only uses the lightweight operations, such as one-way cryptographic hash function and bitwise exclusive-OR (XOR), for the smart devices as they are resource-constrained in nature. SAKA-FC is shown to be secure with the help of the formal security analysis using the broadly accepted Real Or -Random (ROR) model, the formal security verification using the widely-used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and also the informal security analysis. In addition, SAKA-FC is implemented for practical demonstration using the widely-used NS2 simulator. (C) 2018 Elsevier B.V. All rights reserved.
机译:雾计算(雾网络)被称为分散式计算基础架构,其中数据,应用程序,计算以及数据存储分散在数据源(即智能设备)和云之间最逻辑,最高效的位置。它提供了比云计算更好的服务,因为它以较低的成本提供了更好的性能。由于云计算存在安全和隐私问题,而雾计算是云计算的扩展,因此很明显,雾计算将继承云计算的那些安全和隐私问题。在本文中,我们为雾计算环境设计了一种新的安全密钥管理和用户身份验证方案,称为SAKA-FC。 SAKA-FC之所以有效,是因为它仅对资源受限的智能设备使用轻量级操作,例如单向加密哈希功能和按位异或(XOR)。通过使用广泛接受的Real Or -Random(ROR)模型进行正式的安全分析,使用广泛使用的Internet安全协议和应用程序的自动验证(AVISPA)工具进行的正式安全验证,SAKA-FC被证明是安全的。以及非正式的安全分析。另外,使用广泛使用的NS2仿真器实施SAKA-FC进行实际演示。 (C)2018 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号