{"title":"SAKA:在边缘雾多云计算环境中具有可配置密钥演进的可扩展身份验证和密钥协议方案","authors":"Guiliang Chen, Jie Huang, Jiazhou Zeng, Yu Zhou","doi":"10.1016/j.jnca.2025.104220","DOIUrl":null,"url":null,"abstract":"<div><div>Fog computing can efficiently address problems in centralized cloud computing in multi-cloud environments, such as network congestion, data loss, high latency, and excessive energy consumption. However, it poses additional challenges to authentication and key agreement schemes, especially regarding scalability, overhead, and security. To address these challenges, this paper proposes a scalable authentication and key agreement (SAKA) scheme with configurable key evolution tailored for fog computing in multi-cloud environments. The proposed SAKA scheme integrates a configurable key evolution mechanism with a sound synchronization feature and introduces timing constraints to address concurrency-induced key synchronization issues in multi-cloud environments. This approach allows for tailoring the adjustable key renewal period to specific application needs, thus balancing security and overhead. In addition, the SAKA scheme uses the elliptic curve Diffie–Hellman key exchange method with a pre-shared key to establish session keys between fog gateways and cloud applications. This approach eliminates the need for resource-intensive certificates and ensures perfect forward secrecy. Further, implementing the broadcast mechanism in the proposed SAKA scheme reduces computational and communication overhead in multi-cloud environments, thus enhancing scalability. The results of a comprehensive security analysis conducted using both formal and informal methods prove that the proposed SAKA scheme is secure. Finally, a comparison with existing schemes demonstrates that the SAKA scheme excels in security authentication for fog gateways in multi-cloud environments. The proposed SAKA scheme reduces computational overhead by 50% for single-entity authentication and by up to 67% for multi-entity scenarios.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104220"},"PeriodicalIF":7.7000,"publicationDate":"2025-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"SAKA: Scalable authentication and key agreement scheme with configurable key evolution in edge-fog-multicloud computing environments\",\"authors\":\"Guiliang Chen, Jie Huang, Jiazhou Zeng, Yu Zhou\",\"doi\":\"10.1016/j.jnca.2025.104220\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Fog computing can efficiently address problems in centralized cloud computing in multi-cloud environments, such as network congestion, data loss, high latency, and excessive energy consumption. However, it poses additional challenges to authentication and key agreement schemes, especially regarding scalability, overhead, and security. To address these challenges, this paper proposes a scalable authentication and key agreement (SAKA) scheme with configurable key evolution tailored for fog computing in multi-cloud environments. The proposed SAKA scheme integrates a configurable key evolution mechanism with a sound synchronization feature and introduces timing constraints to address concurrency-induced key synchronization issues in multi-cloud environments. This approach allows for tailoring the adjustable key renewal period to specific application needs, thus balancing security and overhead. In addition, the SAKA scheme uses the elliptic curve Diffie–Hellman key exchange method with a pre-shared key to establish session keys between fog gateways and cloud applications. This approach eliminates the need for resource-intensive certificates and ensures perfect forward secrecy. Further, implementing the broadcast mechanism in the proposed SAKA scheme reduces computational and communication overhead in multi-cloud environments, thus enhancing scalability. The results of a comprehensive security analysis conducted using both formal and informal methods prove that the proposed SAKA scheme is secure. Finally, a comparison with existing schemes demonstrates that the SAKA scheme excels in security authentication for fog gateways in multi-cloud environments. The proposed SAKA scheme reduces computational overhead by 50% for single-entity authentication and by up to 67% for multi-entity scenarios.</div></div>\",\"PeriodicalId\":54784,\"journal\":{\"name\":\"Journal of Network and Computer Applications\",\"volume\":\"242 \",\"pages\":\"Article 104220\"},\"PeriodicalIF\":7.7000,\"publicationDate\":\"2025-06-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Network and Computer Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1084804525001171\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Network and Computer Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1084804525001171","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
SAKA: Scalable authentication and key agreement scheme with configurable key evolution in edge-fog-multicloud computing environments
Fog computing can efficiently address problems in centralized cloud computing in multi-cloud environments, such as network congestion, data loss, high latency, and excessive energy consumption. However, it poses additional challenges to authentication and key agreement schemes, especially regarding scalability, overhead, and security. To address these challenges, this paper proposes a scalable authentication and key agreement (SAKA) scheme with configurable key evolution tailored for fog computing in multi-cloud environments. The proposed SAKA scheme integrates a configurable key evolution mechanism with a sound synchronization feature and introduces timing constraints to address concurrency-induced key synchronization issues in multi-cloud environments. This approach allows for tailoring the adjustable key renewal period to specific application needs, thus balancing security and overhead. In addition, the SAKA scheme uses the elliptic curve Diffie–Hellman key exchange method with a pre-shared key to establish session keys between fog gateways and cloud applications. This approach eliminates the need for resource-intensive certificates and ensures perfect forward secrecy. Further, implementing the broadcast mechanism in the proposed SAKA scheme reduces computational and communication overhead in multi-cloud environments, thus enhancing scalability. The results of a comprehensive security analysis conducted using both formal and informal methods prove that the proposed SAKA scheme is secure. Finally, a comparison with existing schemes demonstrates that the SAKA scheme excels in security authentication for fog gateways in multi-cloud environments. The proposed SAKA scheme reduces computational overhead by 50% for single-entity authentication and by up to 67% for multi-entity scenarios.
期刊介绍:
The Journal of Network and Computer Applications welcomes research contributions, surveys, and notes in all areas relating to computer networks and applications thereof. Sample topics include new design techniques, interesting or novel applications, components or standards; computer networks with tools such as WWW; emerging standards for internet protocols; Wireless networks; Mobile Computing; emerging computing models such as cloud computing, grid computing; applications of networked systems for remote collaboration and telemedicine, etc. The journal is abstracted and indexed in Scopus, Engineering Index, Web of Science, Science Citation Index Expanded and INSPEC.