Abstract

Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are used for storing data of the end-user devices. Secure communication between the legitimate edge data-centres during the load balancing process has attracted industrial and academic researchers. Recently, Puthal et al. have proposed a technique for authenticating edge datacenters to enable secure load balancing. However, the resource-constraint nature of the edge data-centres is ignored. The scheme is characterized by complex computation and memory intensive cryptographic protocol. It is also vulnerable to key escrow attack because the secret key used for encrypting and decrypting of the communicated messages is been created by the trusted cloud datacenter. Additionally, the key sharing phase of their algorithm is complex. Therefore, to address the highlighted challenges, this paper proposed a lightweight key escrow-less authentication algorithm that will ensure secure communication of resource-constrained edge data-centres during the load balancing process. The security capability of the proposed scheme has been formally evaluated using the automatic cryptographic analytical tool ProVerif. The relatively low computation and communication costs of the proposed scheme compared to the benchmark schemes proved that it is lightweight, thus suitable for resource-constrained edge datacenters.

Highlights

  • Initialization Phase In this stage, all the parameters required for establishment of authentication between the genuine Edge Datacenters is selected by Key generation centre (KGC)

  • The proposed scheme is proved to be secure against all the possible attacks under, a wellaccepted Canetti-Krawczyk (CK) adversarial mode.The security strength of the proposed scheme is formally investigated using the automated protocol verifier tool called ProVerif is employed

  • Better communication cost is provided by the proposed scheme as compared with the benchmarking schemes

Read more

Summary

Introduction

After thorough investigation of Puthal et al technique for ensuring secure communication of edge data-centres during the load-balancing process, some drawback where found. In this paper, a lightweight authentication free from all the drawbacks of Puthal et al technique is proposed. The security of the proposed technique was systematically evaluated using ProVerif tool and using informal methods as descriptive. The lightweight aspect of the proposed scheme was measured by contrasting the scheme's computation and communication cost with the selected bench-marking schemes.

Objectives
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.