Lightweight authentication technique for secure communication of edge/fog data-centers
Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are used for storing data of the end-user devices. Secure communication between the legitimate edge data-centres during the load balancing process has attracted industrial and academic researchers. Recen...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Published: |
Science and Engineering Research Support Society
2020
|
Subjects: | |
Online Access: | http://eprints.um.edu.my/24681/ http://sersc.org/journals/index.php/IJAST/article/view/14502/7378 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.um.eprints.24681 |
---|---|
record_format |
eprints |
spelling |
my.um.eprints.246812020-06-05T03:26:14Z http://eprints.um.edu.my/24681/ Lightweight authentication technique for secure communication of edge/fog data-centers Yahuza, Muktar Idris, Mohd Yamani Idna Wahab, Ainuddin Wahid Abdul Garba, Adamu Abdullahi Musa, Mahadi A. QA75 Electronic computers. Computer science Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are used for storing data of the end-user devices. Secure communication between the legitimate edge data-centres during the load balancing process has attracted industrial and academic researchers. Recently, Puthal et al. have proposed a technique for authenticating edge datacenters to enable secure load balancing. However, the resource-constraint nature of the edge data-centres is ignored. The scheme is characterized by complex computation and memory intensive cryptographic protocol. It is also vulnerable to key escrow attack because the secret key used for encrypting and decrypting of the communicated messages is been created by the trusted cloud datacenter. Additionally, the key sharing phase of their algorithm is complex. Therefore, to address the highlighted challenges, this paper proposed a lightweight key escrow-less authentication algorithm that will ensure secure communication of resource-constrained edge data-centres during the load balancing process. The security capability of the proposed scheme has been formally evaluated using the automatic cryptographic analytical tool ProVerif. The relatively low computation and communication costs of the proposed scheme compared to the benchmark schemes proved that it is lightweight, thus suitable for resource-constrained edge datacenters. © 2020 SERSC. Science and Engineering Research Support Society 2020 Article PeerReviewed Yahuza, Muktar and Idris, Mohd Yamani Idna and Wahab, Ainuddin Wahid Abdul and Garba, Adamu Abdullahi and Musa, Mahadi A. (2020) Lightweight authentication technique for secure communication of edge/fog data-centers. International Journal of Advanced Science and Technology, 29 (Sp.10). pp. 717-725. ISSN 2005-4238 http://sersc.org/journals/index.php/IJAST/article/view/14502/7378 |
institution |
Universiti Malaya |
building |
UM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaya |
content_source |
UM Research Repository |
url_provider |
http://eprints.um.edu.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Yahuza, Muktar Idris, Mohd Yamani Idna Wahab, Ainuddin Wahid Abdul Garba, Adamu Abdullahi Musa, Mahadi A. Lightweight authentication technique for secure communication of edge/fog data-centers |
description |
Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are used for storing data of the end-user devices. Secure communication between the legitimate edge data-centres during the load balancing process has attracted industrial and academic researchers. Recently, Puthal et al. have proposed a technique for authenticating edge datacenters to enable secure load balancing. However, the resource-constraint nature of the edge data-centres is ignored. The scheme is characterized by complex computation and memory intensive cryptographic protocol. It is also vulnerable to key escrow attack because the secret key used for encrypting and decrypting of the communicated messages is been created by the trusted cloud datacenter. Additionally, the key sharing phase of their algorithm is complex. Therefore, to address the highlighted challenges, this paper proposed a lightweight key escrow-less authentication algorithm that will ensure secure communication of resource-constrained edge data-centres during the load balancing process. The security capability of the proposed scheme has been formally evaluated using the automatic cryptographic analytical tool ProVerif. The relatively low computation and communication costs of the proposed scheme compared to the benchmark schemes proved that it is lightweight, thus suitable for resource-constrained edge datacenters. © 2020 SERSC. |
format |
Article |
author |
Yahuza, Muktar Idris, Mohd Yamani Idna Wahab, Ainuddin Wahid Abdul Garba, Adamu Abdullahi Musa, Mahadi A. |
author_facet |
Yahuza, Muktar Idris, Mohd Yamani Idna Wahab, Ainuddin Wahid Abdul Garba, Adamu Abdullahi Musa, Mahadi A. |
author_sort |
Yahuza, Muktar |
title |
Lightweight authentication technique for secure communication of edge/fog data-centers |
title_short |
Lightweight authentication technique for secure communication of edge/fog data-centers |
title_full |
Lightweight authentication technique for secure communication of edge/fog data-centers |
title_fullStr |
Lightweight authentication technique for secure communication of edge/fog data-centers |
title_full_unstemmed |
Lightweight authentication technique for secure communication of edge/fog data-centers |
title_sort |
lightweight authentication technique for secure communication of edge/fog data-centers |
publisher |
Science and Engineering Research Support Society |
publishDate |
2020 |
url |
http://eprints.um.edu.my/24681/ http://sersc.org/journals/index.php/IJAST/article/view/14502/7378 |
_version_ |
1669008011406868480 |
score |
13.18916 |