DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING
Fog computing is a computational approach where the computing capabilities of the cloud are extended to the edge network. The purpose of fog computing is to reduce data transmission latency between end-devices and centralized computing or can also be referred to as cloud. The fog computing approach...
Saved in:
Main Author: | |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/29278 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | Fog computing is a computational approach where the computing capabilities of the cloud are extended to the edge network. The purpose of fog computing is to reduce data transmission latency between end-devices and centralized computing or can also be referred to as cloud. The fog computing approach is suitable to be implemented on systems that require processing and action on a data in real time. <br />
<br />
Authentication in fog computing is a challenge because here are involved devices that have limitations in terms of computing resources. The authentication solutions that are commonly applied to the world of web and mobile cannot be directly applied to the world of fog computing because it usually requires a lot of computing resources if using these methods <br />
<br />
This final project introduces some methods to authenticate devices and messages in fog computing that are friendly to computing resources of fog computing devices. For device authentication, authentication with encryption approach is used with password and challenge question techniques. For message authentication, HMAC is used to produce MAC that corresponded to the creator of the message. The key for message authentication is produced by key agreement process. |
---|