Creating and sharing knowledge for telecommunications

Authentication protocol for distributed cloud computing circumstance with IoT-enabled devices

Wu, F. ; Li, X. ; Xu, L. ; Sangaiah, A. K. ; Rodrigues, J. R.

IEEE Consumer Electronics Magazine Vol. 7, Nº 6, pp. 38 - 44, November, 2018.

ISSN (print): 2162-2256
ISSN (online):

Journal Impact Factor: 1,153 (in 2016)

Digital Object Identifier: 10.1109/MCE.2018.2851744

As a popular conception, the Internet of Things (IoT) allows people to access more and more data around the world. However, a concern arises of how to store the large amount of data created through this technology. To solve the problem, cloud computing services are brought in as a critical technology. However, it is necessary to guard the private information that is collected via IoT devices and stored in distributed cloud servers. Though authentication schemes are provided, many security weaknesses exist. We present an advanced authentication scheme for cloud computing using only hash functions and exclusive or computations that are suitable for IoT devices, which tend to have limited computation and storage abilities.