DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING
Fog computing is a computational approach where the computing capabilities of the cloud are extended to the edge network. The purpose of fog computing is to reduce data transmission latency between end-devices and centralized computing or can also be referred to as cloud. The fog computing approach...
Saved in:
Main Author: | |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/29278 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
id |
id-itb.:29278 |
---|---|
spelling |
id-itb.:292782018-09-20T13:19:03ZDEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING KAMAL NADJIEB (NIM : 13514054), MUHAMMAD Indonesia Final Project INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/29278 Fog computing is a computational approach where the computing capabilities of the cloud are extended to the edge network. The purpose of fog computing is to reduce data transmission latency between end-devices and centralized computing or can also be referred to as cloud. The fog computing approach is suitable to be implemented on systems that require processing and action on a data in real time. <br /> <br /> Authentication in fog computing is a challenge because here are involved devices that have limitations in terms of computing resources. The authentication solutions that are commonly applied to the world of web and mobile cannot be directly applied to the world of fog computing because it usually requires a lot of computing resources if using these methods <br /> <br /> This final project introduces some methods to authenticate devices and messages in fog computing that are friendly to computing resources of fog computing devices. For device authentication, authentication with encryption approach is used with password and challenge question techniques. For message authentication, HMAC is used to produce MAC that corresponded to the creator of the message. The key for message authentication is produced by key agreement process. text |
institution |
Institut Teknologi Bandung |
building |
Institut Teknologi Bandung Library |
continent |
Asia |
country |
Indonesia Indonesia |
content_provider |
Institut Teknologi Bandung |
collection |
Digital ITB |
language |
Indonesia |
description |
Fog computing is a computational approach where the computing capabilities of the cloud are extended to the edge network. The purpose of fog computing is to reduce data transmission latency between end-devices and centralized computing or can also be referred to as cloud. The fog computing approach is suitable to be implemented on systems that require processing and action on a data in real time. <br />
<br />
Authentication in fog computing is a challenge because here are involved devices that have limitations in terms of computing resources. The authentication solutions that are commonly applied to the world of web and mobile cannot be directly applied to the world of fog computing because it usually requires a lot of computing resources if using these methods <br />
<br />
This final project introduces some methods to authenticate devices and messages in fog computing that are friendly to computing resources of fog computing devices. For device authentication, authentication with encryption approach is used with password and challenge question techniques. For message authentication, HMAC is used to produce MAC that corresponded to the creator of the message. The key for message authentication is produced by key agreement process. |
format |
Final Project |
author |
KAMAL NADJIEB (NIM : 13514054), MUHAMMAD |
spellingShingle |
KAMAL NADJIEB (NIM : 13514054), MUHAMMAD DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING |
author_facet |
KAMAL NADJIEB (NIM : 13514054), MUHAMMAD |
author_sort |
KAMAL NADJIEB (NIM : 13514054), MUHAMMAD |
title |
DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING |
title_short |
DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING |
title_full |
DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING |
title_fullStr |
DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING |
title_full_unstemmed |
DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING |
title_sort |
development of authentication techniques on fog computing |
url |
https://digilib.itb.ac.id/gdl/view/29278 |
_version_ |
1822922866826412032 |