Lightweight authentication technique for secure communication of edge/fog data-centers

Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are used for storing data of the end-user devices. Secure communication between the legitimate edge data-centres during the load balancing process has attracted industrial and academic researchers. Recen...

Full description

Saved in:
Bibliographic Details
Main Authors: Yahuza, Muktar, Idris, Mohd Yamani Idna, Wahab, Ainuddin Wahid Abdul, Garba, Adamu Abdullahi, Musa, Mahadi A.
Format: Article
Published: Science and Engineering Research Support Society 2020
Subjects:
Online Access:http://eprints.um.edu.my/24681/
http://sersc.org/journals/index.php/IJAST/article/view/14502/7378
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.um.eprints.24681
record_format eprints
spelling my.um.eprints.246812020-06-05T03:26:14Z http://eprints.um.edu.my/24681/ Lightweight authentication technique for secure communication of edge/fog data-centers Yahuza, Muktar Idris, Mohd Yamani Idna Wahab, Ainuddin Wahid Abdul Garba, Adamu Abdullahi Musa, Mahadi A. QA75 Electronic computers. Computer science Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are used for storing data of the end-user devices. Secure communication between the legitimate edge data-centres during the load balancing process has attracted industrial and academic researchers. Recently, Puthal et al. have proposed a technique for authenticating edge datacenters to enable secure load balancing. However, the resource-constraint nature of the edge data-centres is ignored. The scheme is characterized by complex computation and memory intensive cryptographic protocol. It is also vulnerable to key escrow attack because the secret key used for encrypting and decrypting of the communicated messages is been created by the trusted cloud datacenter. Additionally, the key sharing phase of their algorithm is complex. Therefore, to address the highlighted challenges, this paper proposed a lightweight key escrow-less authentication algorithm that will ensure secure communication of resource-constrained edge data-centres during the load balancing process. The security capability of the proposed scheme has been formally evaluated using the automatic cryptographic analytical tool ProVerif. The relatively low computation and communication costs of the proposed scheme compared to the benchmark schemes proved that it is lightweight, thus suitable for resource-constrained edge datacenters. © 2020 SERSC. Science and Engineering Research Support Society 2020 Article PeerReviewed Yahuza, Muktar and Idris, Mohd Yamani Idna and Wahab, Ainuddin Wahid Abdul and Garba, Adamu Abdullahi and Musa, Mahadi A. (2020) Lightweight authentication technique for secure communication of edge/fog data-centers. International Journal of Advanced Science and Technology, 29 (Sp.10). pp. 717-725. ISSN 2005-4238 http://sersc.org/journals/index.php/IJAST/article/view/14502/7378
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Research Repository
url_provider http://eprints.um.edu.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Yahuza, Muktar
Idris, Mohd Yamani Idna
Wahab, Ainuddin Wahid Abdul
Garba, Adamu Abdullahi
Musa, Mahadi A.
Lightweight authentication technique for secure communication of edge/fog data-centers
description Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are used for storing data of the end-user devices. Secure communication between the legitimate edge data-centres during the load balancing process has attracted industrial and academic researchers. Recently, Puthal et al. have proposed a technique for authenticating edge datacenters to enable secure load balancing. However, the resource-constraint nature of the edge data-centres is ignored. The scheme is characterized by complex computation and memory intensive cryptographic protocol. It is also vulnerable to key escrow attack because the secret key used for encrypting and decrypting of the communicated messages is been created by the trusted cloud datacenter. Additionally, the key sharing phase of their algorithm is complex. Therefore, to address the highlighted challenges, this paper proposed a lightweight key escrow-less authentication algorithm that will ensure secure communication of resource-constrained edge data-centres during the load balancing process. The security capability of the proposed scheme has been formally evaluated using the automatic cryptographic analytical tool ProVerif. The relatively low computation and communication costs of the proposed scheme compared to the benchmark schemes proved that it is lightweight, thus suitable for resource-constrained edge datacenters. © 2020 SERSC.
format Article
author Yahuza, Muktar
Idris, Mohd Yamani Idna
Wahab, Ainuddin Wahid Abdul
Garba, Adamu Abdullahi
Musa, Mahadi A.
author_facet Yahuza, Muktar
Idris, Mohd Yamani Idna
Wahab, Ainuddin Wahid Abdul
Garba, Adamu Abdullahi
Musa, Mahadi A.
author_sort Yahuza, Muktar
title Lightweight authentication technique for secure communication of edge/fog data-centers
title_short Lightweight authentication technique for secure communication of edge/fog data-centers
title_full Lightweight authentication technique for secure communication of edge/fog data-centers
title_fullStr Lightweight authentication technique for secure communication of edge/fog data-centers
title_full_unstemmed Lightweight authentication technique for secure communication of edge/fog data-centers
title_sort lightweight authentication technique for secure communication of edge/fog data-centers
publisher Science and Engineering Research Support Society
publishDate 2020
url http://eprints.um.edu.my/24681/
http://sersc.org/journals/index.php/IJAST/article/view/14502/7378
_version_ 1669008011406868480
score 13.18916