Font Size: a A A

Research And Implementation Of Trusted Access Security Technology In Edge Computing Environment

Posted on:2022-06-08Degree:MasterType:Thesis
Country:ChinaCandidate:H XieFull Text:PDF
GTID:2518306524479444Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
In the context of the new era,the Internet of Things and 5G communication technologies are in a state of rapid development.The number of terminal devices at the edge of the network is getting larger and larger.The calculation and processing of massive data has brought great pressure to traditional cloud computing.Edge computing is to provide corresponding services in a place closer to the terminal equipment,so that the pressure of data transmission delay and bandwidth faced by cloud computing is alleviated.However,network device in edge computing also faces various security challenges.The conventional protection mechanism in the cloud computing model is difficult to effectively protect terminal devices with limited computing and storage resources,and the terminal devices are large in scale and widely distributed.Once the infected terminal device is connected to the edge computing platform,it will lead to various kinds of security problem.Therefore,how to effectively protect access security in the edge computing environment is very critical.In view of the above problems,this paper studies the trusted access security technology in the edge computing environment,and designs and implements an identity-based anonymous authentication key agreement(AAKA)protocol and a BP neural network-based trust evaluation model,The specific research content is as follows:1.By analyzing the security challenges in the process of mutual authentication between terminal devices and edge computing servers in the edge computing environment,research and design an identity-based anonymous authentication key agreement protocol suitable for edge computing environments.The protocol is based on theoretical knowledge such as the elliptic curve encryption system and bilinear pairing.The terminal device and the edge computing server only need to be registered in the cloud registry to perform mutual authentication,and only a round-trip communication process is required during the authentication process.The security proof based on the complexity assumption and the random oracle model shows that the protocol itself has high security,and has security features such as terminal device anonymity and forward secrecy.2.By studying the trust mechanism in the edge computing environment and selecting appropriate trust evaluation factors,a trust evaluation model is constructed based on the BP neural network model.First,we use Edge Cloud Sim simulation software to obtain data for simulation experiments,and then compare the other three classification methods to verify the evaluation performance superiority of the BP neural network model.Finally,the simulation results show that our trust value evaluation model has achieved better evaluation performance.3.Finally,a trusted access security module is implemented based on the edge computing open source platform Baetyl.The security of the identity authentication protocol designed in this paper is verified in the test environment,and the comparison shows that the protocol has achieved a better performance in both transmission and calculation costs.For the trust evaluation module,the experiment is compared with the AHP analytic hierarchy process.The results show that the trust evaluation method based on the BP neural network in this paper has achieved better evaluation accuracy.
Keywords/Search Tags:edge computing, trusted access security, identity authentication, trust evaluation
PDF Full Text Request
Related items