Hybrid Algorithm to enhance Authentication in Fog Computing
draft-naqshbandi-kitten-hafc-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | FARAZ AHMAD NAQSHBANDI , Karan Verma | ||
Last updated | 2019-02-09 (Latest revision 2018-08-08) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document specifies the problem of attack on authenticity users. The problem is discussed with respect to fog computing environment. The threat exist when any user log in to access the service. The two aspects are either the fog server is fake or the user node is fake. The information stored on the server and transferred over the connection. This information can be highly confidential and sensitive. So to enhance security in this scenario, cloud server can authenticate both the parties and establish the connection. There are chances that it can get attacked and used by illegitimate users. Therefore, there was an utmost need to increase the security on authentication of the users. This document discusses a novel approach to overcome the problem by using a hybrid approach. The technique is based on user authentication and fog authentication by cloud server.
Authors
FARAZ AHMAD NAQSHBANDI
Karan Verma
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)