Round Trip Latency Based Authentication Scheme in Fog-Enabled Cloud Computing System
C. Nagarani1, R. Kousalya2 

1C. Nagarani, Department of Computer Science, PSG College of Arts and Science, Coimbatore, (Tamil Nadu), India.
2R. Kousalya, Department of Computer Application, Dr. N. G. P. Arts and Science College, Coimbatore, (Tamil Nadu), India.

Manuscript received on 12 March 2019 | Revised Manuscript received on 20 March 2019 | Manuscript published on 30 July 2019 | PP: 1270-1278 | Volume-8 Issue-2, July 2019 | Retrieval Number: B1887078219/19©BEIESP | DOI: 10.35940/ijrte.B1887.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: In fog-enabled cloud computing framework, one of the most challenges is security promises due to the compromised passwords. To overcome this issue, different multifactor authentication schemes have been developed that requires additional authentication credentials along with the standard password to authenticate the login. Among those schemes, Communication Latency-based Authentication Scheme (CLAS) increases the protection of conventional web authentication schemes by leveraging the Round Trip network communication Latency (RTL) between clients and authenticators together with standard password. It uses RTL of clients to secure against password compromise. On the other hand, it can support compromise of either the password or the profiled location of a user. This makes it susceptible to same location attacks. As a result, an integration of additional profiling features is needed to attain more robust and flexible defense against password compromise. Hence in this paper, an extended CLAS is proposed that mainly investigates the mobility and same location challenges in CLAS. Initially, the legitimate login failures are solved by handling both selective and arbitrary mobility of users. For selective mobility case, CLAS generates an individual profile for each location and the user may be granted access if his/her real-time login profile matches any of the stored reference profiles. For arbitrary mobility case, CLAS is integrated with two-factor authentication mechanism to authenticate the user. In addition, the defense against Mimic attacks is improved by utility metric-based location anonymization and obfuscation of RTL algorithms. By using these algorithms, the user’s locations are anonymized and the values of RTL are obfuscated to defend against user compromise attempts for impersonating the RTL by getting nearer to the user location. Moreover, a keystroke dynamics measure is introduced with obfuscated RTL measures to effectively defend the same location attacks. This technique alleviates the potential impacts of network instabilities on RTL measurements. As well, it increases the authentication sample space and so improves the security guarantee of CLAS. Finally, the simulation outcomes illustrate that an extended CLAS has the ability to reduce both false positive and false negative rates.
Index Terms: Fog Computing, Cloud Computing, CLAS, Dummy-Based Location Anonymization, Two-Factor Authentication, Keystroke Dynamics

Scope of the Article: Cloud Computing