2020
DOI: 10.1109/mnet.011.2000136
|View full text |Cite
|
Sign up to set email alerts
|

Proxy-Based Federated Authentication: A Transparent Third-Party Solution for Cloud-Edge Federation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

3
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…We also looked into studies that propose solutions for application relocation, and most of these focus on VM migration, for example [25] and [26]. On the other hand, recent papers also provides transparent, low-latency solutions for authentication and mobility within a single edge network [11], [27][28], anonymous mutual authentication in MEC platforms [29], and third-party authentication between cloud and edge [30]. Some work has also been done on the deployment of a secure MEC system in a cellular network that can itself provide authentication for its applications [10].…”
Section: Related Workmentioning
confidence: 99%
“…We also looked into studies that propose solutions for application relocation, and most of these focus on VM migration, for example [25] and [26]. On the other hand, recent papers also provides transparent, low-latency solutions for authentication and mobility within a single edge network [11], [27][28], anonymous mutual authentication in MEC platforms [29], and third-party authentication between cloud and edge [30]. Some work has also been done on the deployment of a secure MEC system in a cellular network that can itself provide authentication for its applications [10].…”
Section: Related Workmentioning
confidence: 99%
“…e local government is under pressure to solve the employment problem of employees and the fluctuation of local finance. Under the influence of local protectionism, the government will intervene in the administration of justice, and the person in charge will also propose to pay more fines in exchange for the opportunity of probation [21][22][23].…”
Section: Cause Analysismentioning
confidence: 99%
“…Santos [13] and FogBus [14] use Representational State Transfer (REST) procedures in HTTP to share information between two platforms to transfer application information. [15] provides a token-based solution to these issues strictly within the MECs deployed by a single 3GPP cellular network (Intra-MNO MEC environment) and another study [16] proposes a transparent proxy that solves the thirdparty authentication issue in a federated 3GPP cellular edge and cloud environment. To the best of our knowledge, this ours the first study that addresses the two key issues in service resumption for mobile users switching from a 3GPP MEC network to a fog network.…”
Section: Related Workmentioning
confidence: 99%