Trustworthy mutual user authentication technique using id in fog computing

https://doi.org/10.55214/25768484.v9i4.6113

Authors

  • K. Sujatha SRM Institute of Science and Technology, Ramapuram, India.
  • D. Sasireka CSE, Mepco Schlenk Engineering College, Sivakasi, India.
  • M. Ayyadurai CSE, Rajalakshmi Engineering College, India.
  • G. Indumathi CSE, SRM Institute of Science and Technology, Ramapuram, India.
  • M. Bharathi AI, K Ramakrishnan College of Technology, Samayapuram, Trichy, India.

The extension of the cloud that provides services to a massive scale of end users to enhance efficient performance is coined as Fog Computing. Whenever a new paradigm arises, a challenging and vital issue is authentication for security. This paper proposes a new improvised Trustworthy Mutual Authentication Technique (TMAT) to achieve complete mutual authentication between end users and fog nodes using IDs in fog computing. Here, the trusted ID issuer is implemented between end users and fog nodes. They receive their authentication ticket while registering themselves with the Trusted ID Issuer (TID). It involves only simple XOR operations and one-way hash functions. The efficiency of the technique is analyzed by implementing various pseudo-random number generators (PRNG) and is obtained within a limited resource environment. This technique is more secure and efficient by avoiding the storage of a master key and repetitions of session keys. It ensures Dynamic Authentication with the usage of minimal infrastructure architecture.

Section

How to Cite

Sujatha, K. ., Sasireka, D. ., Ayyadurai, M. ., Indumathi, G. ., & Bharathi, M. . (2025). Trustworthy mutual user authentication technique using id in fog computing. Edelweiss Applied Science and Technology, 9(4), 841–855. https://doi.org/10.55214/25768484.v9i4.6113

Downloads

Download data is not yet available.

Dimension Badge

Download

Downloads

Issue

Section

Articles

Published

2025-04-10