Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain
<p>System architecture for fog-enabled blockchain-based authentication system.</p> "> Figure 2
<p>Flow diagram for user registration.</p> "> Figure 3
<p>Flow diagram for user authentication.</p> "> Figure 4
<p>An example of smart contract code for user registration.</p> "> Figure 5
<p>An example of smart contract code for user validation.</p> "> Figure 6
<p>The simulation model.</p> "> Figure 7
<p>Comparison of experimental results of the proposed system and existing systems (Almadhoun et al. [<a href="#B36-sensors-22-03956" class="html-bibr">36</a>] and FogAuthChain [<a href="#B1-sensors-22-03956" class="html-bibr">1</a>]) on registration transaction cost.</p> "> Figure 8
<p>Comparison of experimental results of the proposed system and existing systems (Almadhoun et al. [<a href="#B36-sensors-22-03956" class="html-bibr">36</a>] and FogAuthChain [<a href="#B1-sensors-22-03956" class="html-bibr">1</a>]) on registration execution cost.</p> "> Figure 9
<p>Comparison of experimental results of the proposed system and existing systems (Almadhoun et al. [<a href="#B36-sensors-22-03956" class="html-bibr">36</a>] and FogAuthChain [<a href="#B1-sensors-22-03956" class="html-bibr">1</a>]) on registration miner fees.</p> "> Figure 10
<p>Comparison of experimental results of the proposed system and existing systems (Almadhoun et al. [<a href="#B36-sensors-22-03956" class="html-bibr">36</a>] and FogAuthChain [<a href="#B1-sensors-22-03956" class="html-bibr">1</a>]) on authentication transaction cost.</p> "> Figure 11
<p>Comparison of experimental results of the proposed system and existing systems (Almadhoun et al. [<a href="#B36-sensors-22-03956" class="html-bibr">36</a>] and FogAuthChain [<a href="#B1-sensors-22-03956" class="html-bibr">1</a>]) on authentication execution cost.</p> "> Figure 12
<p>Comparison of experimental results of the proposed system and existing systems (Almadhoun et al. [<a href="#B36-sensors-22-03956" class="html-bibr">36</a>] and FogAuthChain [<a href="#B1-sensors-22-03956" class="html-bibr">1</a>]) on authentication miner fees.</p> "> Figure 13
<p>Simulation results showing the time required for authentication and sending packets.</p> ">
Abstract
:1. Introduction
- Propose a secure decentralised user authentication that utilises blockchain technology, smart contract and secure ledger.
- The system can handle authentication requests using the username, password, Ethereum address, user email and data from a biometric sensor.
- The system must guarantee the non-transferability of user data extracted from a biometric reader.
- The system is scalable and can scale to multiple IoT devices.
- The proposed system utilises different authentication methods and data types for user registration and authentication, which will be an improvement when compared to existing methods.
2. Background
2.1. Authentication Systems
2.2. Fog Computing
- Adaptability: These are made up of numerous network sensors and other fog devices that deliver storage resources and handle computing tasks.
- Real-time communications: Fog computing gives real-time communication between fog nodes and with corresponding data deployed in the cloud.
- Physical distribution: Fog computing provides decentralised services and applications hosted on different locations.
- Less latency: Fog computing’s closeness to the edge devices reduces information computing time with the edge devices and aids position responsiveness to host fog devices on several locations.
- Compatibility: Fog modules are designed to work with several platforms through many service providers.
- Web analytics and cloud integration: The fog’s position between the cloud and the edge devices is vital to the computing and processing of data close to the edge devices.
- Heterogeneity: Fog nodes and edge devices are made by different organisations and have different features, and it is necessary they are hosted according to their features.
2.3. Blockchain Technology
3. Related Works
4. Proposed System
- The fog computing environment consists of mobile and immobile devices connected through several networks.
- The registered user devices have access to blockchain technology.
- The fog device must meet requirements to host the blockchain and act as a node or a server.
- The smart contracts should perform tasks of user registration and authentication.
- Nodes should not depend on other nodes to perform tasks.
4.1. System Architecture
- Ethereum Smart Contract:The contract in this authentication system is deployed to handle the task of user registration and authentication. The contract would require information such as the email, passwrd, and the UserEthAdr to enrol users upon registration and to authenticate users in the subsequent interaction with the system.
- Fog Node:The fog nodes are devices that act as servers and blockchain nodes; each node has a copy of the BlockC, LDG, and SmContract. The BlockC information on each node is updated when a User registration or authentication transaction occurs on a node. The fog device or fog server must have enough or necessary requirements to host or to be part of the BlockCN.
- Edge Devices:The end devices are user devices, and they are mapped to nodes during registration and authentication. These devices do not have the resources to host the BlockC.
- Cloud:The cloud is a large storage unit that stores, hosts and computes IoT data. This cloud server is tasked with processing and analysing data generated by IoT or edge devices.
4.2. Proposed System Working
- Initialisation:All parameters of the authentication system applied by the user during the registration are initialised by the Ethereum blockchain. These parameters are valid UserEthAdr (with Ethers or auth coins), valid Usermail, passwrd, and Bdata. The user passwrd and Bdata are hash with SHA256.
- User Registration:In the registration stage, the new user is required to present a valid Usermail, passwrd, and valid UserEthAdr to the BlockCNet, these data are validated and stored through the SmContract. The BlockC identifies this User as a valid User, the data provided by this user are stored on all BlockCN. User registration is represented in Figure 2.
- User Authentication:In the authentication stage, a user sends authentication requests with Usermail, passwrd, UserEthAdr and presents Bdata. The BlockC verifies the User identity through the SmContract and the LDG. The outcome of this process depends on the data provided by the User. The authentication is successful if User presents valid details; otherwise, it is declared unsuccessful. The User authentication is represented in Figure 3. In this proposed system, a new User registers to the network with parameters such as Usermail, passwrd, a valid UserEthAdr, Username, and Bdata. The data from this parameter are hashed with Secure Hash Algorithm (SHA256) and stored on the BlockCNet. For successful authentication, the User must present data according to the parameter presented by the system. In the event of inaccurate data or failed authentication, the User is allowed another authentication attempt.
5. Implementation
Algorithm 1 Pseudocode for user registration |
|
Algorithm 2 Pseudocode for user authentication |
|
6. Experimental Setup
7. Performance Metrics and Results
7.1. Performance Metrics
- Contract deployment cost: cost of deploying the smart contract in the virtual Ethereum environment (the number of ether required to deploy the smart contract).
- User registration cost: the amount of ether required to register a new user in the blockchain network.
- User authentication cost: the amount of ether required to validate the identity of the user in the blockchain network.
7.2. Cisco Packet Tracer Simulation
8. Performance Evaluation
8.1. Registration
8.2. Authentication
8.3. Simulation Results in Cisco Packet Tracer
9. Discussion
10. Conclusions
Author Contributions
Funding
Conflicts of Interest
Abbreviations
Usermail | User email address |
User | User |
Userz | multiple Users |
Username | User name |
passwrd | User password |
EthAdr | Ethereum address |
UserEthAdr | User Ethereum address |
Bdata | Biometric data |
FogN | Fog Node |
EdgeD | Edge Device |
Cld | Cloud |
SHA256 | Online hash function |
SmContract | Smart Contract |
BlockC | Blockchain |
BlockCNet | Blockchain Network |
LDG | Ledger |
EthAcc | Ethereum Account |
References
- Patwary, A.A.N.; Fu, A.; Battula, S.K.; Naha, R.K.; Garg, S.; Mahanti, A. FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain. Comput. Commun. 2020, 162, 212–224. [Google Scholar] [CrossRef]
- Jordan Valinsky, C.B. Here’s How to Tell If Your Facebook Account Was One of the Half Billion That Were Breached. 2021. Available online: https://edition.cnn.com/2021/04/05/tech/facebook-data-leaked-how-to-tell/index.html (accessed on 1 December 2021).
- Andy, B.N. LinkedIn 2012 Hack: What You Need to Know. 2017. Available online: https://www.ncsc.gov.uk/blog-post/linkedin-2012-hack-what-you-need-know (accessed on 1 December 2021).
- ‘One Billion’ Affected by Yahoo Hack. 2017. Available online: https://www.bbc.co.uk/news/world-us-canada-38324527 (accessed on 1 December 2021).
- Winder, D. Zoom Gets Stuffed: Here’s How Hackers Got Hold of 500,000 Passwords. Available online: https://www.forbes.com/sites/daveywinder/2020/04/28/zoom-gets-stuffed-heres-how-hackers-got-hold-of-500000-passwords/?sh=40c6a0315cdc (accessed on 1 December 2021).
- Wang, W.; Huang, H.; Zhang, L.; Su, C. Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Netw. Appl. 2021, 14, 2681–2693. [Google Scholar] [CrossRef]
- Tuli, S.; Mahmud, R.; Tuli, S.; Buyya, R. Fogbus: A blockchain-based lightweight framework for edge and fog computing. J. Syst. Softw. 2019, 154, 22–36. [Google Scholar] [CrossRef] [Green Version]
- Guo, Y.; Guo, Y. FogHA: An efficient handover authentication for mobile devices in fog computing. Comput. Secur. 2021, 108, 102358. [Google Scholar] [CrossRef]
- Fotohi, R.; Shams Aliee, F. Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT. Comput. Netw. 2021, 197, 108331. [Google Scholar] [CrossRef]
- Omar, I.A.; Hasan, H.R.; Jayaraman, R.; Salah, K.; Omar, M. Implementing decentralized auctions using blockchain smart contracts. Technol. Forecast. Soc. Chang. 2021, 168, 120786. [Google Scholar] [CrossRef]
- Novo, O. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet Things J. 2018, 5, 1184–1195. [Google Scholar] [CrossRef]
- Juneja, K. An XML transformed method to improve effectiveness of graphical password authentication. J. King Saud Univ.-Comput. Inf. Sci. 2020, 32, 11–23. [Google Scholar] [CrossRef]
- Wang, X.; Yan, Z.; Zhang, R.; Zhang, P. Attacks and defenses in user authentication systems: A survey. J. Netw. Comput. Appl. 2021, 188, 103080. [Google Scholar] [CrossRef]
- Lee, Y.K.; Jeong, J. Securing biometric authentication system using blockchain. ICT Express 2021, 7, 322–326. [Google Scholar] [CrossRef]
- Fotouhi, M.; Bayat, M.; Das, A.K.; Far, H.A.N.; Pournaghi, S.M.; Doostari, M.A. A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput. Netw. 2020, 177, 107333. [Google Scholar] [CrossRef]
- Hossain, M.J.; Xu, C.; Li, C.; Mahmud, S.H.; Zhang, X.; Li, W. ICAS: Two-factor identity-concealed authentication scheme for remote-servers. J. Syst. Archit. 2021, 117, 102077. [Google Scholar] [CrossRef]
- Sabireen, H.; Neelanarayanan, V. A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges. ICT Express 2021, 7, 162–176. [Google Scholar]
- Zhang, T.; Huang, Z. Blockchain and central bank digital currency. ICT Express 2021, 7, 1–7. [Google Scholar] [CrossRef]
- Esposito, C.; Ficco, M.; Gupta, B.B. Blockchain-based authentication and authorization for smart city applications. Inf. Process. Manag. 2021, 58, 102468. [Google Scholar] [CrossRef]
- Khalid, U.; Asim, M.; Baker, T.; Hung, P.C.; Tariq, M.A.; Rafferty, L. A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Clust. Comput. 2020, 23, 2067–2087. [Google Scholar] [CrossRef]
- Kalaria, R.; Kayes, A.; Rahayu, W.; Pardede, E. A Secure Mutual authentication approach to fog computing environment. Comput. Secur. 2021, 111, 102483. [Google Scholar] [CrossRef]
- Bonnah, E.; Shiguang, J. DecChain: A decentralized security approach in Edge Computing based on Blockchain. Future Gener. Comput. Syst. 2020, 113, 363–379. [Google Scholar] [CrossRef]
- Maurya, A.K.; Das, A.K.; Jamal, S.S.; Giri, D. Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters. J. Syst. Archit. 2021, 120, 102296. [Google Scholar] [CrossRef]
- Shen, M.; Liu, H.; Zhu, L.; Xu, K.; Yu, H.; Du, X.; Guizani, M. Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J. Sel. Areas Commun. 2020, 38, 942–954. [Google Scholar] [CrossRef]
- Chow, M.C.; Ma, M. A lightweight traceable D2D authentication and key agreement scheme in 5G cellular networks. Comput. Electr. Eng. 2021, 95, 107375. [Google Scholar] [CrossRef]
- Sarier, N.D. Efficient biometric-based identity management on the Blockchain for smart industrial applications. Pervasive Mob. Comput. 2021, 71, 101322. [Google Scholar] [CrossRef]
- Hammi, M.T.; Hammi, B.; Bellot, P.; Serhrouchni, A. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Comput. Secur. 2018, 78, 126–142. [Google Scholar] [CrossRef]
- Sánchez Sánchez, P.M.; Fernández Maimó, L.; Huertas Celdrán, A.; Martínez Pérez, G. AuthCODE: A privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning. Comput. Secur. 2021, 103, 102168. [Google Scholar] [CrossRef]
- Yang, W.; Wang, S.; Shahzad, M.; Zhou, W. A cancelable biometric authentication system based on feature-adaptive random projection. J. Inf. Secur. Appl. 2021, 58, 102704. [Google Scholar] [CrossRef]
- Al-Naji, F.H.; Zagrouba, R. CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things. J. King Saud Univ.-Comput. Inf. Sci. 2020, 1–18. [Google Scholar] [CrossRef]
- Tahir, M.; Sardaraz, M.; Muhammad, S.; Saud Khan, M. A lightweight authentication and authorization framework for blockchain-enabled IoT network in health-informatics. Sustainability 2020, 12, 6960. [Google Scholar] [CrossRef]
- Gong, L.; Alghazzawi, D.M.; Cheng, L. BCoT sentry: A blockchain-based identity authentication framework for IoT devices. Information 2021, 12, 203. [Google Scholar] [CrossRef]
- Feng, X.; Shi, Q.; Xie, Q.; Liu, L. An Efficient Privacy-preserving Authentication Model based on blockchain for VANETs. J. Syst. Archit. 2021, 117, 102158. [Google Scholar] [CrossRef]
- Gupta, B.; Quamara, M. An identity based access control and mutual authentication framework for distributed cloud computing services in IoT environment using smart cards. Procedia Comput. Sci. 2018, 132, 189–197. [Google Scholar] [CrossRef]
- Chatterjee, S.; Roy, S.; Das, A.K.; Chattopadhyay, S.; Kumar, N.; Vasilakos, A.V. Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment. IEEE Trans. Dependable Secur. Comput. 2016, 15, 824–839. [Google Scholar] [CrossRef]
- Almadhoun, R.; Kadadha, M.; Alhemeiri, M.; Alshehhi, M.; Salah, K. A user authentication scheme of IoT devices using blockchain-enabled fog nodes. In Proceedings of the 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, Jordan, 28 October–1 November 2018; pp. 1–8. [Google Scholar]
- Loffi, L.; Westphall, C.M.; Grüdtner, L.D.; Westphall, C.B. Mutual authentication with multi-factor in IoT-Fog-Cloud environment. J. Netw. Comput. Appl. 2021, 176, 102932. [Google Scholar] [CrossRef]
- Imine, Y.; Kouicem, D.E.; Bouabdallah, A.; Ahmed, L. MASFOG: An efficient mutual authentication scheme for fog computing architecture. In Proceedings of the 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 608–613. [Google Scholar]
- Chen, S.; Yang, L.; Zhao, C.; Varadarajan, V.; Wang, K. Double-blockchain Assisted Secure and Anonymous Data Aggregation for Fog-enabled Smart Grid. Engineering 2020, 8, 159–169. [Google Scholar] [CrossRef]
- Baniata, H.; Anaqreh, A.; Kertesz, A. PF-BTS: A Privacy-Aware Fog-enhanced Blockchain-assisted task scheduling. Inf. Process. Manag. 2021, 58, 102393. [Google Scholar] [CrossRef]
- Shao, W.; Jia, C.; Xu, Y.; Qiu, K.; Gao, Y.; He, Y. AttriChain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain. Comput. Secur. 2020, 99, 102069. [Google Scholar] [CrossRef]
- Patil, A.S.; Hamza, R.; Hassan, A.; Jiang, N.; Yan, H.; Li, J. Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts. Comput. Secur. 2020, 97, 101958. [Google Scholar] [CrossRef]
- Solidity. Remix-Ethereum IDE. 2022. Available online: https://remix.ethereum.org/#optimize=false&runs=200&evmVersion=null&version=soljson-v0.8.7+commit.e28d00a7.js (accessed on 10 April 2022).
- Truffle Suite. Ganache. 2022. Available online: https://trufflesuite.com/ganache/index.html (accessed on 1 November 2021).
- Metemask. Metamask Wallet. 2022. Available online: https://metamask.io/ (accessed on 1 November 2021).
- Cisco Packet Tracer 8.0.1: Download Free Labs and Tutorials for CCNA v7 Certification Exam Preparation. Available online: https://www.netacad.com/courses/packet-tracer (accessed on 16 October 2021).
- Triantafyllou, A.; Sarigiannidis, P.; Lagkas, T.D. Network protocols, schemes, and mechanisms for internet of things (iot): Features, open challenges, and trends. Wirel. Commun. Mob. Comput. 2018, 2018, 5349894. [Google Scholar] [CrossRef] [Green Version]
- Gamundani, A.M.; Phillips, A.; Muyingi, H.N. An overview of potential authentication threats and attacks on Internet of Things (IoT): A focus on Smart home applications. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 50–57. [Google Scholar]
- Alzoubi, Y.I.; Al-Ahmad, A.; Kahtan, H. Blockchain technology as a Fog computing security and privacy solution: An overview. Comput. Commun. 2022, 182, 129–152. [Google Scholar] [CrossRef]
- Guo, H.; Yu, X. A Survey on Blockchain Technology and its security. Blockchain Res. Appl. 2022, 182, 129–152. [Google Scholar] [CrossRef]
- Rohit Bhagwat, A.K. A Research on Secure Shell (SSH) Protocol. Int. J. Adv. Res. Sci. Commun. Technol. 2020, 9, 56–60. [Google Scholar]
Work | Distributed Model | Data Breach Protection | Mutual Authentication | Multi-Factor Authentication | Scalability | Robust against Attacks |
---|---|---|---|---|---|---|
FogAuthChain [1] | Y | Y | Y | N | Y | Y |
FogHA [8] | Y | Y | Y | N | NA | Y |
Blockchain meets IoT [11] | Y | N | N | N | Y | NA |
B. Gupta [34] | Y | NA | Y | Y | NA | NA |
SDFC [35] | Y | NA | N | N | NA | NA |
Esposito et al. [19] | Y | NA | N | N | NA | NA |
Khalid et al. [20] | Y | NA | Y | N | NA | Y |
Kalaria et al. [21] | Y | Y | Y | N | NA | Y |
Dechain [22] | Y | Y | Y | N | NA | Y |
Meng et al. [24] | Y | NA | Y | N | NA | NA |
Chow and Ma [25] | N | NA | Y | N | NA | Y |
Bubble of trust [27] | Y | Y | Y | N | Y | Y |
AuthCODE [28] | N | NA | N | N | NA | NA |
Almadhoun et al. [36] | Y | Y | Y | N | Y | Y |
Leandrloffi et al. [37] | N | Y | Y | Y | NA | Y |
Masfog [38] | Y | Y | Y | NA | NA | NA |
FogBus [7] | Y | NA | N | N | Y | NA |
DA-SADA [39] | Y | Y | NA | N | NA | Y |
PF-BTS [40] | Y | Y | NA | N | Y | Y |
AttriChain [41] | Y | NA | NA | N | NA | Y |
Patil et al. [42] | Y | NA | NA | N | NA | Y |
Our Proposed work | Y | Y | Y | Y | Y | Y |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Umoren, O.; Singh, R.; Pervez, Z.; Dahal, K. Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain. Sensors 2022, 22, 3956. https://doi.org/10.3390/s22103956
Umoren O, Singh R, Pervez Z, Dahal K. Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain. Sensors. 2022; 22(10):3956. https://doi.org/10.3390/s22103956
Chicago/Turabian StyleUmoren, Otuekong, Raman Singh, Zeeshan Pervez, and Keshav Dahal. 2022. "Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain" Sensors 22, no. 10: 3956. https://doi.org/10.3390/s22103956
APA StyleUmoren, O., Singh, R., Pervez, Z., & Dahal, K. (2022). Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain. Sensors, 22(10), 3956. https://doi.org/10.3390/s22103956