Hybrid Algorithm to enhance Authentication in Fog Computing
draft-naqshbandi-kitten-hafc-00

Document Type Active Internet-Draft (individual)
Last updated 2018-08-08
Stream (None)
Intended RFC status (None)
Formats plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date
Responsible AD (None)
Send notices to (None)
<Networks Working Group>                                 F. Naqshbandi
INTERNET-DRAFT                                              NIT, Delhi                                             
Intended Status: Standards Track                              K. Verma                             
Expires: February 8, 2019                           Assistant Professor                                        
                                                            NIT, Delhi                                                         
                                                       
                                                         August 8, 2018  

      Hybrid Algorithm to enhance Authentication in Fog Computing
                      draft-naqshbandi-kitten-hafc-00.txt

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with 
   the provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups. Note that
   other groups may also distribute working documents as
   Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six 
   months and may be updated, replaced, or obsoleted by other 
   documents at any time. It is inappropriate to use Internet-Drafts
   as reference material or to cite them other than as 
   "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/1id-abstracts.html

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

Copyright and License Notice

      Copyright (c) 2018 IETF Trust and the persons identified as the 
      document authors. All rights reserved.

      This document is subject to BCP 78 and the IETF Trust's Legal 
      Provisions Relating to IETF Documents 
      (http://trustee.ietf.org/license-info) in effect on the date of
      publication of this document. Please review these documents 
      carefully, as they describe your rights and restrictions with 
      respect to this document. Code Components extracted from this 
      document must include Simplified BSD License text as described 
      in Section 4.e of the Trust Legal Provisions and are provided
      without warranty as described in the Simplified BSD License.

 

F. Naqshbandi, K. Verma  Expires February 8, 2019                [Page 1]
INTERNET DRAFT Hybrid Algorithm to enhance Authentication in Fog Computing  August 8, 2018

   Abstract

   This document specifies the problem of attack on authenticity users. 
   The problem is discussed with respect to fog computing environment. 
   The threat exist when any user log in to access the service.
   The two aspects are either the fog server is fake or the user node 
   is fake. The information stored on the server and transferred over 
   the connection. This information can be highly confidential and 
   sensitive. So to enhance security in this scenario, cloud server can 
   authenticate both the parties and establish the connection. There 
   are chances that it can get attacked and used by illegitimate users. 
   Therefore, there was an utmost need to increase the security on 
   authentication of the users. This document discusses a novel 
   approach to overcome the problem by using a hybrid approach. The 
   technique is based on user authentication and fog authentication
   by cloud server.

Table of Contents

   1  Introduction  . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2 Requirements Notation  . . . . . . . . . . . . . . . . . . . . .  3
   3  Terminology . . . . . . . . . . . . . . . . . . . . . . . . . .  3
   4 Authentication Schemes . . . . . . . . . . . . . . . . . . . . .  3
   5  Security Considerations. . . . .. . . . . . . . . . . . . . . .  4
   6  IANA Considerations . . . . . . . . . . . . . . . . . . . . . .  5
   7 Other Considerations . . . . . . . . . . . . . . . . . . . . . .  5
   8 Conclusions  . . . . . . . . . . . . . . . . . . . . . . . . . .  6
   9 References . . . . . . . . . . . . . . . . . . . . . . . . . . .  6
     9.1  Normative References  . . . . . . . . . . . . . . . . . . .  6
     9.2  Informative References  . . . . . . . . . . . . . . . . . .  6
   10 Acknowledgements  . . . . . . . . . . . . . . . . . . . . . . .  7
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .  7

 

F. Naqshbandi, K. Verma  Expires February 8, 2019                [Page 2]
INTERNET DRAFT Hybrid Algorithm to enhance Authentication in Fog Computing  August 8, 2018

1  Introduction

   Fog computing is an advancement of cloud computing that came into
   existence to reduce the load on the cloud server. When cloud
   computing did not fulfil the client need like latency, data 
   overload, less computational speed to satisfy the need of clients
   [1]. Fog servers were introduced as the intermediate layer to cloud. 
Show full document text