Enhancing user verification and data security scheme for fog computing using self sovereign identification

Otuekong Umoren, Amjad Ali*, Zeeshan Pervez*, Farman Ali, Raman Singh, Keshav Dahal, Ala Al-Fuqaha

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Due to the advancements in technology, the number of connected devices in a data processing and computing environment of edge and Internet of Things (IoT) has increased exponentially. Thus, proliferation of electronics by billions has raised serious security concerns. Therefore, designing effective coordination mechanisms and ensuring user verification and data security pose significant challenges in edge environments. Moreover, dispersed architecture of fog computing presents challenges related to privacy, secure authentication, and fog device security. Therefore, to address these drawbacks, in this paper, we propose an novel approach to enhance user verification and data security in edge environment. Our proposed scheme leverages the intrinsic properties of the Ethereum blockchain to develop a smart contract-based solution for registering and verifying digital identities securely to mitigate security and privacy concerns associated with traditional authentication techniques. We demonstrate the effectiveness of the proposed scheme via experiments and simulations conducted on the Ethereum blockchain environment. The results indicate that the proposed scheme outperform than other state-of-the-art techniques in terms of transaction gas and execution cost for both identity registration and verification.
Original languageEnglish
Article number103876
Number of pages14
JournalAd Hoc Networks
Volume175
Early online date25 Apr 2025
DOIs
Publication statusE-pub ahead of print - 25 Apr 2025

Keywords

  • verification
  • authentication
  • self-sovereign identification
  • edge computing
  • Blockchain
  • smart contracts

Fingerprint

Dive into the research topics of 'Enhancing user verification and data security scheme for fog computing using self sovereign identification'. Together they form a unique fingerprint.

Cite this