Font Size: a A A

Research On IoT Secure Storage And Authentication Mechanism Under Cloud-Fog Integrated Computing Model

Posted on:2020-03-26Degree:MasterType:Thesis
Country:ChinaCandidate:J Q CaiFull Text:PDF
GTID:2428330578952392Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
The cloud-fog integrated computing model formed by the cooperation of cloud computing and fog computing has become a highly efficient computing model in today's IoT technology.However,the fog makes the IoT system more complicated.The malicious fog nodes' attack will lead to the leakage of users' privacy data and threaten the security of user's data.The transparency of the data storage service causes the user to lose control and management rights of the uploaded data.Cloud service provider(CSP)that are not fully trusted may reveal users'privacy.How to realize the access control and data secure storage under the cloud-fog integrated computing mode has become one of the urgent problems to be solved.The paper focuses on the users' data security problem under the cloud-fog integrated computing mode,which include the identity authentication mechanism and secure data storage scheme.The paper puts forward the identity authentication mechanism and data security storage solution under the cloud-fog integrated computing mode for IoT.Specifically,the main work of this paper is as follow:(1)Focus on the identity authentication problem,this paper proposes an identity authentication mechanism to defend against malicious fog nodes' attack.In this mechanism,users need to confirm the legal identity of fog servers in order to prevent the malicious fog nodes from obtaining the users'private information.In this paper,based on the users' privacy protection problem,the identity-based cryptography(IBC)technology is used to complete the nodes' identity authentication while avoiding the heavy burden of public key certificates management.This mechanism use the timestamp mechanism ensures the freshness of the information and prevents malicious fog nodes from launching replay attacks that threaten users' data security.Temporary anonymous identity in this mechanism protects users' identity privacy and prevents users' information flow from being maliciously tracked.(2)A new LRC-based fast RSBSA-LRC data security storage scheme is proposed for users' data storage.In this scheme,users can control the number of data blocks stored in each layer to effectively resist the privacy leakage threat caused by incomplete trusted cloud service providers.At the same time,the random sequence based shuffling algorithm random-sequence based shuffle algorithm(RSBSA)proposed by this scheme can disrupt the original data structure and prevent incomplete trusted cloud service providers from conjecturing individual data block content to obtain users' privacy.Then the paper analyzes the security of the proposed schames.Moreover,the proposed schemes are simulated and compared with other related schemes.The results show that the schemes guarantee the users' data storage security under the delay time acceptable to the user,and effectively resist internal attacks from incomplete trusted CSPs and external attacks from malicious fog nodes.Finally,the paper summarizes the research results,points out the problems in the research process and look forward to the future of identity authentication and data storage security technology in IoT under the cloud-fog integrated computing model.
Keywords/Search Tags:cloud-fog integrated computing model, IoT, identity authentication, data storage security
PDF Full Text Request
Related items