Font Size: a A A

Design And Analysis Of Identity Authentication Protocols In Edge Computing Network

Posted on:2021-06-06Degree:MasterType:Thesis
Country:ChinaCandidate:X YaoFull Text:PDF
GTID:2518306050954449Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
Under the background of the Internet of Everything,edge computing is an extension and expansion of cloud computing to provide services for massive terminal devices.Cloud computing sinks its capabilities to the edge.It deploys edge node devices on network nodes close to the terminal to process the data generated by the terminal,which solves the problem of overloading the network bandwidth and provides better real-time services.The emergence of edge computing has also changed the "cloud-to-device" secondary network architecture of traditional cloud computing and evolved into a "cloud-edge-device" tertiary network architecture.The new network architecture has many levels of edge node devices,broad terminal device access,and heterogeneity,and mobility.As a result,the traditional cloud computing security solution is no longer suitable for edge computing,which allows terminal devices to connect to the network.Entry authentication and cross-domain authentication bring new challenges.Besides,in the edge computing environment,the security domains on the edge of the network are mixed,and distributed collaboration services are used among multiple edge node devices.This open system of numerous security domains also brings new challenges to the privacy protection of terminal devices.Given the particularity of the edge computing environment,based on the "cloud-edge-device" three-level network architecture,this thesis introduces an identity-based cryptosystem and designs a set of identity authentication schemes between terminal devices,edge node devices and cloud servers,including Access authentication and cross-domain authentication of edge node devices and terminal devices.Cross-domain authentication uses anonymous authentication to ensure that devices do not reveal they're true identities to non-home edge node devices while authenticating their identity.Then the security analysis of the proposed scheme was carried out.Also,the scheme uses a layered private key generation center to solve the problem of authentication efficiency caused by massive terminal device access.It proposes an identity-based key management scheme suitable for edge computing networks.The device generates a pseudo-identity ID through its ID and a random number,and the private key generation center generates a key pair through the pseudo-identity ID to protect the device's identity privacy.Finally,based on the OpenStack open-source cloud,a cloud center platform was built.The platform supports cloud center authentication support for edge node devices through OpenStack components.Docker containers and container orchestration tools are used to deploy edge node service environments,and Python language is used to implement identity authentication protocol modules,Sockets are used for communication between devices.Based on this platform,the functional design of the above-identified identity authentication protocol in edge computing network is tested.The test results show that the proposed scheme can provide safe and efficient identity authentication and privacy protection capabilities for edge node devices and terminal devices.
Keywords/Search Tags:Edge computing, Identity authentication, Privacy protection, Cloud computing
PDF Full Text Request
Related items