Font Size: a A A

Research On Key Technologies Of Secure Resource Sharing In The Internet Of Things

Posted on:2022-06-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y J LiFull Text:PDF
GTID:2518306476990019Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The development of the Internet of Things has given birth to new informatization concepts such as smart homes,smart cities and mobile crowd perception.Due to the openness of the network,various mobile terminal devices frequently carry out data communication,information interaction and resource sharing,which are widely used in fields such as telemedicine,unmanned vehicle driving and remote physical environment monitoring.The development of Internet of Things has brought great convenience to people's lives.At the same time,it has been severely challenged in terms of user privacy leakage,secret sharing data leakage and unauthorized access to resources.The existing resource sharing schemes have insufficient considerations for privacy protection,security of shared data and access control of data.In view of these problems,this paper mainly studies the secure resource-sharing protocol based on ciphertext attribute authentication,the secure resource-sharing protocol based on blockchain storage and the scalable secure resource-sharing access control protocol based on permission combination.The main work of this paper is as follows:(1)In view of the security threats such as the leakage of private information and the theft of data by illegal users in the process of data resource sharing in Internet of Things(Io T),a secure resource sharing protocol based on ciphertext attribute authentication is proposed.This protocol adopts a hidden attribute identity authentication method to authenticate each terminal device in Io T.Firstly,the attributes of the terminal device are encrypted and hidden,then the encrypted attributes are used for identity authentication.While ensuring the legitimacy of the terminal device participating in data sharing,the leakage of private information of the terminal device is avoided.The authenticated terminal device calculates the encryption key to encrypt and store the shared resources.It can also download and decrypt the shared resources through dual authentication of authority and identity.Under the discrete logarithm problem and the assumptions of bilinear Diffie-Hellman problem,the protocol is proved to be safe and has good performance.(2)In view of the data transmission and communication among smart devices in the Industrial Internet of Things(IIo T),which may easily lead to data resource leakage,loss and long response time,a secure resource-sharing protocol based on blockchain storage is proposed.In this protocol,the authenticated terminals negotiate encryption keys to encrypt their shared resources,so as to avoid leakage or loss of information resources in the process of communication and transmission.It uses blockchain-based data storage technology for encrypted shared resources.It uses a combination of on-chain and off-chain storage methods on the blockchain.The encrypted shared resources are stored in the off-chain database of blockchain.Only the index information of shared resource ciphertext and resource storage address are stored in the block,which reduces the storage burden of the blockchain.Combined with the immutability and traceability of blockchain to track illegal access to achieve efficient,secure and flexible data storage and management.Under the discrete logarithm problem and the assumptions of bilinear Diffie-Hellman problem,the protocol is proved to be safe and has good performance.(3)In view of the problems such as fixed access rights,overstepping access rights and security loopholes in the process of information resource sharing in Io T,a scalable access control protocol for secure resource sharing based on permission combination is proposed.The protocol uses the identity authentication technology of hidden attributes to authenticate each terminal member,and divides the user authority level by setting the threshold function of the terminal user's attribute.The terminal user uses the corresponding attribute parameter to obtain the corresponding attribute permission value,and uses different attribute permission combinations to calculate different privilege level values,thereby accessing shared resources with different sensitivity levels.It realizes fine-grained,flexible and secure access to cloud server data while protecting personal privacy.In addition,when terminal users obtain resources,the method of identity and authority joint authentication is adopted to verify the terminal user,which avoids the collusion attack of the illegal user and makes the resource access control more secure.According to the theory of provable safety,the protocol is proved to be safe and has good performance.
Keywords/Search Tags:Information security, Data resource sharing, Authentication, Access control, Blockchain
PDF Full Text Request
Related items