Font Size: a A A

Data Sharing Mechanism For Lightweight Devices In Edge Computing

Posted on:2022-04-23Degree:MasterType:Thesis
Country:ChinaCandidate:X H GaoFull Text:PDF
GTID:2518306605468474Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
The rapid development of Internet of things(Io T)and 5G technology provides a broad space and powerful power for the development of smart home,smart medical and driverless technology.However,in the environment of Internet of things,the Iot devices produce a large amount of data.When data transmission and exchange are carried out,the flow of cloud computing will be too high.It will lead to network congestion,service interruption and network delay,and affect the stability of sensor devices and data user experience.Edge computing extends the network computing mode of cloud computing.The edge layer acts as the middle layer between the cloud and the end users,and concentrates the data storage and processing on the edge of the LAN closest to the end users.This makes the computing framework scalable,low latency and high efficiency.But,data will be stolen in the process of transmission and exchange,resulting in the leakage of user data and privacy.Attributebased encryption(ABE)can achieve flexible fine-grained access control,protect user privacy and the security and integrity in data transmission.However,the traditional attribute based encryption system can not be directly used for lightweight devices in the edge computing environment.How to establish a secure data sharing system in the edge computing is still a big challenge.In view of the above problems,this thesis studies from the following aspects:1)Aiming at the problems of slow response,data security and user privacy leakage of traditional e-health system,an e-health encryption system in edge computing is designed.It realizes the resource limited edge device lightweight computing,and makes the system more rapid and convenient.In this system,the computing resources are deployed,the cloud server and the edge server provide users with data encryption and decryption,data transmission and data storage services,which can quickly respond to access requests.Aiming at the defect that a large number of modular exponentiation operations in attribute based encryption algorithm need powerful computing power,modular exponentiation operations are outsourced.These calculations are unloaded to the edge server layer,and the correctness of the returned results is verified to ensure the data security.In addition,mask technology is used in outsourcing calculation to realize the privacy protection of user attributes.2)In order to solve the resource limitation in the edge network environment,a distributed attribute based encryption system is designed to support user privacy protection.The key generation task is distributed in the edge layer,which reduces the network delay when users get the key.The anonymous private key extraction protocol is designed based on blind identity encryption.The user and each authorization center run twoparty security computing protocol to generate private key.It hides the information of user's GID and user's attribute set,effectively resists simple DDH test,protects user privacy and enhances the security of key.At the same time,the problem of distributed attribute base encryption scheme is easy to be attacked by conspiracy,the linear association between private keys is eliminated.Unauthorized users can neither combine their private keys to generate legitimate private keys,nor can they combine their decryption results to recover plaintext messages,thus ensuring data security.
Keywords/Search Tags:Edge Computing, Data Secure Sharing, Attribute-based Encryption, Privacy Protection, Security Outsourcing Computing
PDF Full Text Request
Related items