4.5 Article

Secure and novel authentication model for protecting data centers in fog environment

期刊

WIRELESS NETWORKS
卷 29, 期 4, 页码 1671-1683

出版社

SPRINGER
DOI: 10.1007/s11276-022-03220-5

关键词

Fog; Edge computing; Authentication; Cloud; Data center; Security

向作者/读者索取更多资源

Fog computing has gained intense interest as it provides real-time cloud services and resolves latency issues in cloud computing. However, the networking infrastructure of fog computing still requires further research, especially in terms of security for remote edge data centers. This paper proposes a lightweight, strong authentication scheme to ensure secure communication between edge data centers.
The model of the fog environment for real-time applications has recently become a research area of intense interest as it offers cloud services instantly to users. Fog computing also resolves several important and challenging issues related to the cloud computing model, including latency issues. Despite these added services, however, the fog networking infrastructure is still based on an emerging standard that requires further research. Since an edge data Center is typically placed in a remote location, the requirements for protecting it through authentication mechanism have become a major focus. Most current solutions have addressed the optimization of load balancing, which is an important issue, but have failed to resolve several other challenging problems. Among the other prevalent issues in fog computing, security has become the most important and complex issue. This paper aims to address and resolve the question of security by recommending a lightweight, strong authentication scheme that ensures safe communication between edge data centers. The proposed security scheme is carefully assessed, and ensured that its computation cost is low compared with other exisitng solutions. The suggested scheme improves the security of the entire fog network by only permitting legitimate edge data centers while performing vital cloud computing services and is a suitable option for resource-constrained computational devices.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据