Hybrid Algorithm to enhance Authentication in Fog Computing
draft-naqshbandi-kitten-hafc-00

Document Type Expired Internet-Draft (individual)
Last updated 2019-02-09 (latest revision 2018-08-08)
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-naqshbandi-kitten-hafc-00.txt

Abstract

This document specifies the problem of attack on authenticity users. The problem is discussed with respect to fog computing environment. The threat exist when any user log in to access the service. The two aspects are either the fog server is fake or the user node is fake. The information stored on the server and transferred over the connection. This information can be highly confidential and sensitive. So to enhance security in this scenario, cloud server can authenticate both the parties and establish the connection. There are chances that it can get attacked and used by illegitimate users. Therefore, there was an utmost need to increase the security on authentication of the users. This document discusses a novel approach to overcome the problem by using a hybrid approach. The technique is based on user authentication and fog authentication by cloud server.

Authors

NAQSHBANDI Faraz (172211004@nitdelhi.ac.in)
Karan Verma (karan.verma.phd@gmail.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)