Font Size: a A A

Research On Data Encryption Schemes In Edge Computing

Posted on:2021-05-30Degree:MasterType:Thesis
Country:ChinaCandidate:X F ShengFull Text:PDF
GTID:2438330605958470Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet of Everything(IoE),the various application data of mobile terminals have exploded.The edge computing can effectively solve the problems of cloud computing which cannot meet the real-time and low-latency requirements of distributed data.The problem of private data leakage of end users will emerge while the application of edge computing brings convenience to our lives.Due to the particular characteristics of edge devices,encryption technology in cloud computing cannot be directly applied to edge computing,so the data encryption problem in edge computing needs to be solved urgently.Because of traditional data encryption technologies are mostly based on bilinear pairing encryption schemes,result in low efficiency.Meanwhile the third parties to distribute encryption certificates consumes massive resources and is not satisfied to the characteristics of edge computing.In addition,the exponential growth of edge data causes delays in edge data transmission,which exacerbates the risk of data leakage during transmission.In respect of the issues above,this paper studies the data encryption problems in edge computing,including the following two main contents:(1)We proposed an encryption scheme with unbilinear pairing(UPE)in edge computing.Firstly,we defined an edge encryption model based on the edge computing network,and proposed the Key Trust Authority(KTA)to generate and distribute some keys.The data owner uses the public key to calculate the ciphertext and the authentication information,and sent it to the edge node.The end user applies its private key to decrypt the ciphertext after authentication.Secondly,we applies unbilinear pairing encryption scheme to edge computing,and proposed five algorithms for edge computing data transmission,which are system settings,key generation,data encryption,data verification,and data decryption.Finally,experimental analysis shows that the UPE scheme meets the unforgeability and confidentiality requirements of the random oracle model,and can effectively reduce the energy consumption of end nodes and improve the computing efficiency of edge devices.(2)We proposed a differential aggregation encryption(DAE)scheme in edge computing.Firstly,we used the improved Simulated Annealing Module Partition(SAMP)algorithm to divide the end users into optimal modules.The end sensors collect the end user data and forward it.The edge nodes performs edge-level data aggregation and encrypted transmission,then edge nodes further process and transmit data to the cloud for cloud-level aggregation.Secondly,the terminal data is aggregated using Laplace mechanism for differential privacy aggregation,and then encrypted using the improved Diffie-Hellman algorithm to resist differential attacks duringdata transmission.Finally,the experimental analysis shows that this solution can effectively improve the bandwidth efficiency and ensure the privacy of end users' private data.
Keywords/Search Tags:Edge computing, Data encryption, Un-bilinear pairings, Data aggregation, Differential privacy
PDF Full Text Request
Related items