학술논문

Biometric Based Secure Edge-Cloud Communication Protocol
Document Type
Conference
Source
2024 14th International Conference on Cloud Computing, Data Science & Engineering (Confluence) Cloud Computing, Data Science & Engineering (Confluence), 2024 14th International Conference on. :239-244 Jan, 2024
Subject
Bioengineering
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Engineering Profession
Fields, Waves and Electromagnetics
General Topics for Engineers
Robotics and Control Systems
Signal Processing and Analysis
Cloud computing
Data privacy
Protocols
Sensitivity
Biometrics (access control)
Europe
Impersonation attacks
Biometric authentication
Edge computing
RSA
BAN logic
Language
ISSN
2766-421X
Abstract
Edge Computing is introduced to take cloud computing a step further by bringing it closer to the devices we use. It does this by moving the heavy lifting of computing, network control, and storage to places like Base Stations and access points right at the edge of the network. But, security is a major concern due to the expanding usage of edge devices that use cloud applications and the increasing possibility of hackers getting unauthorized access to personal data stored in the cloud. However, the current protocols have some design weaknesses and are susceptible to several security attacks like replay attacks, man-in-the-middle attacks, and impersonation attacks. Addressing these attacks, this work proposes an authenticated key establishment protocol employing encrypted biometrics in edge computing architecture for safe communication between clients and the cloud server. Given its sensitivity, biometric data is used following privacy protection rules like the “General Data Protection Regulation (GDPR)” of the European Union. Protecting biometric template data is essential for preserving user privacy and combating identity theft. Our proposed protocol maintains user anonymity and user untraceability with the use of Secure hash algorithm 3 (SHA-3). Burrows-Abadi-Needham (BAN) logic is used for checking and verification of the proposed protocol.