DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING

Fog computing is a computational approach where the computing capabilities of the cloud are extended to the edge network. The purpose of fog computing is to reduce data transmission latency between end-devices and centralized computing or can also be referred to as cloud. The fog computing approach...

Full description

Saved in:
Bibliographic Details
Main Author: KAMAL NADJIEB (NIM : 13514054), MUHAMMAD
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/29278
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:29278
spelling id-itb.:292782018-09-20T13:19:03ZDEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING KAMAL NADJIEB (NIM : 13514054), MUHAMMAD Indonesia Final Project INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/29278 Fog computing is a computational approach where the computing capabilities of the cloud are extended to the edge network. The purpose of fog computing is to reduce data transmission latency between end-devices and centralized computing or can also be referred to as cloud. The fog computing approach is suitable to be implemented on systems that require processing and action on a data in real time. <br /> <br /> Authentication in fog computing is a challenge because here are involved devices that have limitations in terms of computing resources. The authentication solutions that are commonly applied to the world of web and mobile cannot be directly applied to the world of fog computing because it usually requires a lot of computing resources if using these methods <br /> <br /> This final project introduces some methods to authenticate devices and messages in fog computing that are friendly to computing resources of fog computing devices. For device authentication, authentication with encryption approach is used with password and challenge question techniques. For message authentication, HMAC is used to produce MAC that corresponded to the creator of the message. The key for message authentication is produced by key agreement process. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description Fog computing is a computational approach where the computing capabilities of the cloud are extended to the edge network. The purpose of fog computing is to reduce data transmission latency between end-devices and centralized computing or can also be referred to as cloud. The fog computing approach is suitable to be implemented on systems that require processing and action on a data in real time. <br /> <br /> Authentication in fog computing is a challenge because here are involved devices that have limitations in terms of computing resources. The authentication solutions that are commonly applied to the world of web and mobile cannot be directly applied to the world of fog computing because it usually requires a lot of computing resources if using these methods <br /> <br /> This final project introduces some methods to authenticate devices and messages in fog computing that are friendly to computing resources of fog computing devices. For device authentication, authentication with encryption approach is used with password and challenge question techniques. For message authentication, HMAC is used to produce MAC that corresponded to the creator of the message. The key for message authentication is produced by key agreement process.
format Final Project
author KAMAL NADJIEB (NIM : 13514054), MUHAMMAD
spellingShingle KAMAL NADJIEB (NIM : 13514054), MUHAMMAD
DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING
author_facet KAMAL NADJIEB (NIM : 13514054), MUHAMMAD
author_sort KAMAL NADJIEB (NIM : 13514054), MUHAMMAD
title DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING
title_short DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING
title_full DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING
title_fullStr DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING
title_full_unstemmed DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING
title_sort development of authentication techniques on fog computing
url https://digilib.itb.ac.id/gdl/view/29278
_version_ 1822922866826412032