IoT 17(11): e5

Research Article

Secure Login Using Multi-Tier Authentication Schemes in Fog Computing

Download1084 downloads
  • @ARTICLE{10.4108/eai.26-3-2018.154382,
        author={Awais Manzoor and Abdul Wahid and Munam Ali Shah and Adnan Akhunzada and Faisal Fayyaz Qureshi},
        title={Secure Login Using Multi-Tier Authentication Schemes in Fog Computing},
        journal={EAI Endorsed Transactions on Internet of Things},
        volume={3},
        number={11},
        publisher={EAI},
        journal_a={IOT},
        year={2017},
        month={7},
        keywords={Authentication, Multi-tier Authentications, Cloud computing, Multifactor authentications, cloud security.},
        doi={10.4108/eai.26-3-2018.154382}
    }
    
  • Awais Manzoor
    Abdul Wahid
    Munam Ali Shah
    Adnan Akhunzada
    Faisal Fayyaz Qureshi
    Year: 2017
    Secure Login Using Multi-Tier Authentication Schemes in Fog Computing
    IOT
    EAI
    DOI: 10.4108/eai.26-3-2018.154382
Awais Manzoor1,*, Abdul Wahid1, Munam Ali Shah1, Adnan Akhunzada1, Faisal Fayyaz Qureshi1
  • 1: Department of Computer Science COMSATS Institute of Information Technology Islamabad, Pakistan
*Contact email: malik.awaismanzoor@yahoo.com

Abstract

Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different multi-tier authentication schemes exist in literature that overcome the weakness of single sign-on. This paper surveys state-of-the-art multi-tier authentication techniques, their vulnerabilities, security threats and their solution proposed over the period of 2012-2016. We compare the performance of existing multi-tier authentication schemes on three parameters, i.e., cost, usability and level of security. Multi-tier authentication schemes have been categorized into groups according to the factors involved in the authentication process. Lastly, we aim to provide an easy and concise view of the underlying authentication model adapted by each approach