Abstract
Fog computing utilizes devices in the edge network to transmit data with very low latency and supports high mobility.How-ever,fog computing inherits security and privacy problems from cloud computing.Therefore,various privacy schemes for fog computing have been proposed to prevent different types of attacks.Recently,Weng et al proposed a fog computing authentication scheme;after ana-lyzing,we found that Weng et al's scheme cannot resist user tracking attack and user impersonation attack.Then,we propose an improved scheme through adding a password,modifying the calculation method of Ei,and adding timestamps.In addition,we also compare the im-proved scheme with existing authentication schemes in terms of security and computational efficiency.The results show that the improved scheme is more secure and has less computation.