A low-cost privacy preserving user access in mobile edge computing framework

dc.authoridhttps://orcid.org/0000-0002-1366-2834en_US
dc.authoridhttps://orcid.org/0000-0002-9321-6956en_US
dc.authoridhttps://orcid.org/0000-0001-7474-0405en_US
dc.authoridhttps://orcid.org/0000-0003-4221-0877en_US
dc.contributor.authorIrshad, Azeem
dc.contributor.authorChaudhry, Shehzad Ashraf
dc.contributor.authorGhani, Anwar
dc.contributor.authorMallah, Ghulam Ali
dc.contributor.authorBilal, Muhammad
dc.contributor.authorAlzahrani, Bander A.
dc.date.accessioned2023-10-05T07:44:23Z
dc.date.available2023-10-05T07:44:23Z
dc.date.issued2022en_US
dc.departmentMühendislik ve Mimarlık Fakültesien_US
dc.description.abstractThe computational offloading from conventional cloud datacenter towards edge devices sprouted a new world of prospective applications in pervasive and Mobile Edge Computing (MEC) paradigm, leading to substantial gains in the form of increased availability, bandwidth with low latency. The MEC offers real-time computing and storage facility within the proximity of mobile user-access network, hence it is imperative to secure communication between end user and edge server. The existing schemes do not fulfill real time processing and efficiency requirements for using complex crypto-primitives. To this end, we propose a novel two-factor biometric authentication protocol for MEC enabling efficient and secure combination of Physically Unclonable Functions (PUFs) with user-oriented biometrics employing fuzzy extractor-based procedures. The performance analysis depicts that our scheme offers resistance to known attacks using lightweight operations and supports 30% more security features than comparative studies. Our scheme is provably secure under Real-or-Random (ROR) formal security analysis model.en_US
dc.identifier.doi10.1016/j.compeleceng.2022.107692en_US
dc.identifier.endpage13en_US
dc.identifier.issn0045-7906
dc.identifier.issn1879-0755
dc.identifier.scopus2-s2.0-85122640336en_US
dc.identifier.scopusqualityQ1en_US
dc.identifier.startpage1en_US
dc.identifier.urihttps://hdl.handle.net/11363/5756
dc.identifier.urihttps://doi.org/
dc.identifier.volume98en_US
dc.identifier.wosWOS:000754465600001en_US
dc.identifier.wosqualityQ2en_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.indekslendigikaynakScopusen_US
dc.institutionauthorChaudhry, Shehzad Ashraf
dc.language.isoenen_US
dc.publisherPERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLANDen_US
dc.relation.ispartofComputers and Electrical Engineeringen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectPervasive and mobile edge computingen_US
dc.subjectAuthenticationen_US
dc.subjectSymmetric key operationsen_US
dc.subjectPUFen_US
dc.subjectIoTen_US
dc.titleA low-cost privacy preserving user access in mobile edge computing frameworken_US
dc.typeArticleen_US

Dosyalar

Orijinal paket
Listeleniyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
Ä°sim:
1-s2.0-S0045790622000143-main.pdf
Boyut:
2.23 MB
Biçim:
Adobe Portable Document Format
Açıklama:
Makale / Article
Lisans paketi
Listeleniyor 1 - 1 / 1
Küçük Resim Yok
Ä°sim:
license.txt
Boyut:
1.56 KB
Biçim:
Item-specific license agreed upon to submission
Açıklama: