Font Size: a A A

Research On The Security Technology Of Data Query In Fog Computing

Posted on:2020-08-24Degree:MasterType:Thesis
Country:ChinaCandidate:N WuFull Text:PDF
GTID:2428330602458742Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet,more and more mobile terminal devices connection to Internet.The traditional cloud computing can no longer satisfy the Internet for high mobility,geographical distribution,location awareness,low latency.The fog computing migrates some of the functions such as data storage and calculation from the cloud computing center to the edge of the network,so as to better meets the new service requirements of the Internet of Things(IOT).Although the fog computing solves the current situation of the IOT,it brings hidden dangers to data security.Therefore,this paper mainly proposes some solutions to the data query security problems in fog computing.Firstly,this paper improved the WPKI mechanism and implemented the certificate authentication scherue of fog nodes in fog network.Secondly,based on the interaction between cloud server and fog servers,a secure data query framework for cloud and fog computing and a secure data sequence query framework based on multiple fog servers are proposed by using group signature technology,secret sharing scheme,Merkle hash tree and data query technology.The main work summarized as follows:(1)First,this paper takes the mobile terminal entity in the WPKI structure as the fog node in the fog network,and the content server assumes the function of the fog server,improves WPKI mechanism applies to the certificate verification between fog nodes and fog server,the security authentication scheme between fog nodes based on CDS_OCSP is implemented.This scheme optimizes the number of interactions and the process of interactions between the fog nodes and fog network of the whole certificate verification mechanism in the fog network environment.At the same time,the scheme uses the encryption/decryption function based on ECC to verify the certificate digest,ensure the consistency of the authentication certificate.(2)Second,aiming at the data query in fog network,this paper proposes a secure data query framework for cloud and fog computing.In this framework,the cloud server uses node random sampling algorithm to realize random sampling of operational data of fog node devices,and uses the secure secret sharing scheme to realize the security data operation between the fog nodes in the fog network and the security data interaction between the cloud server and the fog network.Finally,the cloud server verifies the data operation process of the whole fog network.(3)Finally,aiming at the data sequence query in fog computing,this paper proposes a security data sequence query framework based on multiple fog servers,which uses the fog server to randomly select one of the multiple Merkle hash trees prespecified by the cloud server to obtain relevant data from its leaf nodes.At the same time,the real Merkle hash tree is constructed according to the topological relationship of the Merkle hash tree selected by the fog network,wherein the relevant fog node participates in calculation and transmits the hash value,the root node calculates and distributes the sub-secret of the hash root value to other fog servers by using the threshold secret sharing scheme,the sub-secret would be used by users to implement sequence data query validation.
Keywords/Search Tags:Fog computing, Cloud computing, Fog network, Security, WPKI, Data query
PDF Full Text Request
Related items