Font Size: a A A

Design And Implement Of Trusted Authentication Service Module Based On Data Edge Cache

Posted on:2021-03-26Degree:MasterType:Thesis
Country:ChinaCandidate:Z K LiFull Text:PDF
GTID:2518306308467134Subject:Computer technology
Abstract/Summary:PDF Full Text Request
To connect the IoT application system,the IoT device must first perform identity authentication.The traditional IoT authentication process is isolated from each other,authentication data is not shared and lack of data interoperability across systems,which results in repeated authentication.In order to solve the problem that authentication data cannot be shared in the Internet of Things scenario,this article improves the system model based on[1],and builds a system model that includes the blockchain network layer,edge computing layer,and IoT device layer.With the help of Blockchain technology,this modle realizes distributed,secure and trusted storage of authentication data.Using edge computing technology,it can process real-time requests from massive IoT devices.And it uses the limited cache space of edge computing nodes to cache some authentication data.For the existing security and authentication efficiency issues under this modle,a trusted authentication scheme based on data edge caching is designed,and a trusted authentication service module is implemented based on this scheme.First,in order to ensure the authentication security between the edge computing node and the Internet of Things devices,this paper designs an anonymous identity authentication scheme based on ECC.Through security analysis and efficiency analysis,it can be seen that the authentication scheme proposed in this paper has less computation and communication overhead on the basis of effectively ensuring the authentication security.Then in order to make full use of the limited cache resources of edge computing nodes,reduce the number of requests for authentication data from the blockchain network layer,and improve authentication efficiency,this paper designs an edge cache update strategy CCP based on content popularity.Through comparison with the traditional cache update strategies Random,LRU and Optimal,it can be seen that the CCP strategy proposed in this paper has better performance,and the cache hit rate is increased by about 30%compared with the LRU strategy.Finally,based on the above authentication scheme,this paper designs and implements a trusted authentication service module based on Ethereum.The module has two major functions of registration and authentication,mainly including the smart contract layer,SDK encapsulation layer and application layer.Finally,the module's availability is verified through the deployment and operation of the module.
Keywords/Search Tags:Identity Authentication, Edge Cache Update, Internet of Things, Blockchain, Edge Computing
PDF Full Text Request
Related items