Provisioning Fog Services to 3GPP Subscribers: Authentication and Application Mobility

Multi-Access Edge computing (MEC) and Fog computing provide services to subscribers at low latency. There is a need to form a federation among 3GPP MEC and fog to provide better coverage to 3GPP subscribers. This federation gives rise to two issues—third-party authentication and application mobility—for continuous service during handover from 3GPP MEC to fog without re-authentication. In this paper, we propose: 1) a proxy-based state transfer and third-party authentication (PS3A) that uses a transparent proxy to transfer the authentication and application state information, and 2) a token-based state transfer and proxy-based third-party authentication (TSP3A) that uses the proxy to transfer the authentication information and tokens to transfer the application state from 3GPP MEC to the fog. The proxy is kept transparent with virtual counterparts, to avoid any changes to the existing 3GPP MEC and fog architectures. We implemented these solutions on a testbed and results show that PS3A and TSP3A provide authentication within 0.345–2.858s for a 0–100 Mbps proxy load. The results further show that TSP3A provides application mobility while taking 40–52% less time than PS3A using state tokens. TSP3A and PS3A also reduce the service interruption latency by 82.4% and 84.6%, compared to the cloudbased service via tokens and prefetching.

[1]  Qun Li,et al.  A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.

[2]  Rajkumar Buyya,et al.  FogBus: A Blockchain-based Lightweight Framework for Edge and Fog Computing , 2018, J. Syst. Softw..

[3]  Asad Ali,et al.  Proxy-Based Federated Authentication: A Transparent Third-Party Solution for Cloud-Edge Federation , 2020, IEEE Network.

[4]  Giang T. Nguyen,et al.  FAST: Flexible and Low-latency State Transfer in Mobile Edge Computing , 2020, GLOBECOM 2020 - 2020 IEEE Global Communications Conference.

[5]  Pawani Porambage,et al.  A Survey on Mobile Augmented Reality With 5G Mobile Edge Computing: Architectures, Applications, and Technical Aspects , 2021, IEEE Communications Surveys & Tutorials.

[6]  Yuan-Cheng Lai,et al.  Transparent 3rd-Party Authentication with Application Mobility for 5G Mobile Edge Computing , 2020, 2020 European Conference on Networks and Communications (EuCNC).

[7]  Bruno Volckaert,et al.  Towards Network-Aware Resource Provisioning in Kubernetes for Fog Computing Applications , 2019, 2019 IEEE Conference on Network Softwarization (NetSoft).

[8]  Jorge Navas,et al.  Understanding and mitigating OpenID Connect threats , 2019, Comput. Secur..

[9]  Lein Harn,et al.  Hierarchical Polynomial-Based Key Management Scheme in Fog Computing , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[10]  Xuemin Shen,et al.  A Service-Agent-Based Roaming Architecture for WLAN/Cellular Integrated Networks , 2007, IEEE Transactions on Vehicular Technology.

[11]  Kwangjo Kim,et al.  3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA , 2009, 2009 Wireless Telecommunications Symposium.

[12]  Kin K. Leung,et al.  Live Service Migration in Mobile Edge Clouds , 2017, IEEE Wireless Communications.

[13]  Mu-En Wu,et al.  A secure authenticated and key exchange scheme for fog computing , 2020, Enterp. Inf. Syst..