Secure Lightweight Multi-Factor Authentication Scheme for Three-Layer Architecture: User-Fog-Cloud Environment

Authors

  • K. Shanthi, R. Maruthi

Keywords:

Fog computing, cloud computing, lightweight, authentication, three layer architecture

Abstract

Fog computing is an expanded and dispersed environment where processes related to applications are maintained  between the end-user device and the clustered system's edge for better and more. The fog computing paradigm carries over the cloud's security and privacy vulnerabilities due to its inherited features. One of the primary security issues is authentication. Secure authentication scheme is necessary to access difference services for permissible users. Password-based authentications and other single sign-on procedures for user identification are not secure methods. To navigate around the drawbacks of the single sign-on process, a number of multi-tier authentication methods are suggested.For a user-fog-cloud scenario, this paper suggests a secure lightweight multifactor authentication technique. This paper presents a method for multifactor mutual authentication between user-fog and fog-cloud using lightweight cryptography functions using bitwise operators. For user-fog authentication, multifactor authentication scheme is used, which includes knowledge (password), possession (personal identity with QR-code) and inherent (biometric) factors. For fog-cloud authentication, simple mutual authentication is used which includes lightweight cryptographic hash function with simple operations. The computation and communication costs are examined to assess the efficacy of the proposed work. The simulation results demonstrate that the proposed approach is highly efficient and safe. When compared to the state-of-the-art, the suggested method drastically reduces the computing cost.

Downloads

Download data is not yet available.

References

Kumar V, Jangirala S, Ahmad M. An efficient mutual authentication framework for healthcare system in cloud computing. Journal of medical systems. 2018;42(8):1-25.

Mukherjee M, Shu L, Wang D. Survey of fog computing: fundamental, network applications, and research challenges. IEEE Communications Surveys & Tutorials. 2018;20(3):1826-1857.

Neware R, Shrawankar U. Fog computing architecture, applications and security issues. International Journal of Fog Computing. 2020;3(1):75-105.

Sarkar S, Misra, S. Theoretical modelling of fog computing: a green computing paradigm to support IoT applications. Iet Networks. 2016;5(2):23-29.

Ali HS, Sridevi R. Credential-based authentication mechanism for IoT devices in fog-cloud computing. ICT Analysis and Applications, Springer. 2022;307-318

Sudha MN, Rajendiran M, Specht M, Reddy KS, Sugumaran S. A low-area design of two-factor authentication using DIES and SBI for IoT security. The Journal of Supercomputing. 2022;78(3):4503-4525.

Juneja K. An XML transformed method to improve effectiveness of graphical password authentication. Journal of King Saud University-Computer and Information Sciences. 2020;32(1):11-23.

Wang X, Yan Z, Zhang R, Zhang P. Attacks and defenses in user authentication systems: A survey. Journal of Network and Computer Applications. 2021;188.

Ghahramani M, Javidan R, Shojafar M. A secure biometric-based authentication protocol for global mobility networks in smart cities. The Journal of supercomputing. 2020;76:8729-8755.

Lee YK, Jeong J. Securing biometric authentication system using blockchain. ICT Express. 2021; 7:322–326.

Khaskheli GM, Sherbaz M, Shaikh UR. A comparative usability study of single-factor and two-factor authentication. Tropical Scientific Journal. 2022;1(1):17-27.

Sadri MJ, Asaar MR. An anonymous two-factor authentication protocol for IoT-based applications. Computer Networks. 2021;199.

Alsahlani AY F, Popa A. LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment. Journal of Network and Computer Applications, 2021;192

Weng CY, Li CT, Chen CL, Lee CC, Deng YY. A lightweight anonymous authentication and secure communication scheme for fog computing services. IEEE Access. 2021;9:145522-145537.

Atiewi S, Al-Rahayfeh A, Almiani M, Yussof S, Alfandi O, Abugabah A, Jararweh Y. Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography. IEEE Access. 2020;8:113498-113511.

Liu W, Wang X, Peng W. Secure remote multi-factor authentication scheme based on chaotic map zero-knowledge proof for crowdsourcing internet of things. IEEE Access. 2020;8:8754-8767.

Kalaria R, Kayes ASM, Rahayu W, Pardede E. A secure mutual authentication approach to fog computing environment. Computers & Security. 2021;111.

Khalid H, Hashim SJ, Ahmad SMS, Hashim F, Chaudhary MA. SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems. Sensors. 2021; 21(4).

Prabakaran D, Ramachandran S. Multi-factor authentication for secured financial transactions in cloud environment. CMC-Computers. Materials & Continua. 2022;70(1):1781-1798.

Deebak BD, Fadi AT. Lightweight authentication for IoT/cloud-based forensics in intelligent data computing. Future generation computer systems. 2021;116:406-425.

Kaur D, Kumar D. Cryptanalysis and improvement of a two-factor user authentication scheme for smart home. Journal of Information Security and Applications. 2021;58.

Yu S, Jho N, Park Y. Lightweight three-factor-based privacy-preserving authentication scheme for IoT-enabled smart homes. IEEE Access. 2021;9:126186-126197.

Ali Z, Hossain MS, Muhammad G, Ullah I, Abachi H, Alamri A. Edge-centric multimodal authentication system using encrypted biometric templates. Future Generation Computer Systems. 2018;85:76-87.

Dhillon PK, Kalra S. Multi-factor user authentication scheme for IoT-based healthcare services. Journal of Reliable Intelligent Environments. 2018;4:141-160.

Mostafa A, Lee SJ, Peker YK. Physical unclonable function and hashing are all you need to mutually authenticate IoT devices. Sensors. 2020;20(16).

Alshawish I, Al-Haj A. An efficient mutual authentication scheme for IoT systems. The Journal of Supercomputing. 2022;1-32.

Liu D, Li Z, Wang C, Ren Y. Enabling secure mutual authentication and storage checking in cloud-assisted IoT. Mathematical Biosciences and Engineering. 2022;19(11):11034-11046.

Agrahari AK, Varma S, Venkatesan S. Two factor authentication protocol for IoT based healthcare monitoring system. Journal of Ambient Intelligence and Humanized Computing. 2022;1-18.

Dai C, Xu Z. A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography. Ad Hoc Networks. 2022;127.

Sahoo SS, Mohanty S, Majhi B. An efficient three-factor user authentication scheme for industrial wireless sensor network with fog computing. International Journal of Communication Systems. 2022;35(3).

Singh S, Chaurasiya VK. Mutual authentication framework using fog computing in healthcare. Multimedia Tools and Applications. 2022;81(22):31977-32003.

Zou S, Cao Q, Wang C, Huang Z, Xu G. A robust two-factor user authentication scheme-based ECC for smart home in IoT. IEEE Systems Journal. 2021;16(3):4938-4949.

Masud M, Gaba GS, Choudhary K, Hossain MS, Alhamid MF, Muhammad G. Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare. IEEE Internet of Things Journal. 2021;9(4):2649-2656.

Nikravan M, Reza A. A multi-factor user authentication and key agreement protocol based on bilinear pairing for the Internet of Things. Wireless Personal Communication. 2020;111(1):463–494.

Wu TY, Wang T, Lee YQ, Zheng W, Kumari S, Kumar S. Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Security and Communication Network. 2021;1–16.

Chen CM, Chen Z, Kumari S, Lin MC. LAP-IoHT: A lightweight authentication protocol for the internet of health things. Sensors. 2022;22(14).

Yu S, Park Y. A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions. IEEE Internet of Things Journal. 2022;9(20):20214-20228.

Ayman Mohamed Mostafa 1,* , Mohamed Ezz 2 , Murtada K. Elbashir 1 , Meshrif Alruily 2 , Eslam Hamouda 2 , Mohamed Alsarhani 2 and Wael Said 3, Strengthening Cloud Security: An Innovative Multi-Factor Appl. Sci. 2023, 13(19), 10871; https://doi.org/10.3390/app131910871

Junhui Zhao a b, Fanwei Huang a, Huanhuan Hu a, Longxia Liao a, Dongming Wang c, Lisheng Fan d User security authentication protocol in multi gateway scenarios of the Internet of Things Ad Hoc Networks Volume 156, 1 April 2024, 103427 https://doi.org/10.1016/j.adhoc.2024.103427 February 2024

Downloads

Published

24.03.2024

How to Cite

K. Shanthi. (2024). Secure Lightweight Multi-Factor Authentication Scheme for Three-Layer Architecture: User-Fog-Cloud Environment. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 3040–3048. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5895

Issue

Section

Research Article