DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING

Fog computing is a computational approach where the computing capabilities of the cloud are extended to the edge network. The purpose of fog computing is to reduce data transmission latency between end-devices and centralized computing or can also be referred to as cloud. The fog computing approach...

Full description

Saved in:
Bibliographic Details
Main Author: KAMAL NADJIEB (NIM : 13514054), MUHAMMAD
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/29278
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
Description
Summary:Fog computing is a computational approach where the computing capabilities of the cloud are extended to the edge network. The purpose of fog computing is to reduce data transmission latency between end-devices and centralized computing or can also be referred to as cloud. The fog computing approach is suitable to be implemented on systems that require processing and action on a data in real time. <br /> <br /> Authentication in fog computing is a challenge because here are involved devices that have limitations in terms of computing resources. The authentication solutions that are commonly applied to the world of web and mobile cannot be directly applied to the world of fog computing because it usually requires a lot of computing resources if using these methods <br /> <br /> This final project introduces some methods to authenticate devices and messages in fog computing that are friendly to computing resources of fog computing devices. For device authentication, authentication with encryption approach is used with password and challenge question techniques. For message authentication, HMAC is used to produce MAC that corresponded to the creator of the message. The key for message authentication is produced by key agreement process.