Enhancing user verification and data security scheme for fog computing using self sovereign identification

Otuekong Umoren, Amjad Ali, Zeeshan Pervez, Farman Ali, Raman Singh, Keshav Dahal, Ala Al-Fuqaha

Research output: Contribution to journalShort surveypeer-review

1 Scopus citations

Abstract

Due to the advancements in technology, the number of connected devices in a data processing and computing environment of edge and Internet of Things (IoT) has increased exponentially. Thus, proliferation of electronics by billions has raised serious security concerns. Therefore, designing effective coordination mechanisms and ensuring user verification and data security pose significant challenges in edge environments. Moreover, dispersed architecture of fog computing presents challenges related to privacy, secure authentication, and fog device security. Therefore, to address these drawbacks, in this paper, we propose an novel approach to enhance user verification and data security in edge environment. Our proposed scheme leverages the intrinsic properties of the Ethereum blockchain to develop a smart contract-based solution for registering and verifying digital identities securely to mitigate security and privacy concerns associated with traditional authentication techniques. We demonstrate the effectiveness of the proposed scheme via experiments and simulations conducted on the Ethereum blockchain environment. The results indicate that the proposed scheme outperform than other state-of-the-art techniques in terms of transaction gas and execution cost for both identity registration and verification.

Original languageEnglish
Article number103876
JournalAd Hoc Networks
Volume175
DOIs
StatePublished - 1 Aug 2025

Keywords

  • Authentication
  • Blockchain
  • Edge computing
  • Self-sovereign identification
  • Smart contracts
  • Verification

Fingerprint

Dive into the research topics of 'Enhancing user verification and data security scheme for fog computing using self sovereign identification'. Together they form a unique fingerprint.

Cite this