Font Size: a A A

A Trusted Sharing Scheme Oriented To New Mobile Network Computing Model

Posted on:2022-10-17Degree:MasterType:Thesis
Country:ChinaCandidate:W L LiFull Text:PDF
GTID:2518306605470834Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
There are a large number of scattered and heterogeneous platforms on the edge of the region,which makes it difficult to centrally allocate computing resources and complicate task decision-making factors.Therefore,it becomes very difficult to collect,transmit and process information when the remote center cannot be connected.With the development of new mobile network computing models with dispersed computing as the core,according to changes in task requirements,the use of idle communication and computing resources at the edge of the network to transmit and calculate data becomes more convenient.Data generating and transmitting in the network becomes more and more convenient.However,the dispersed computing model is facing an increasingly severe security situation.The dispersed computing model is a computing model in which multiple trust domains coexist.There are a large number of unauthorized or malicious nodes in the network.In such a network environment,the nodes are not trustworthy.They are vulnerable to attacks from outside the trust domain when communicating.When data is stored in the network,the data may not only be maliciously accessed or modified by storage nodes,but may also face the risk of being stolen and cracked by malicious nodes.The difficulty of data sharing between nodes has increased exponentially.In order to ensure the security of data transmission,the dispersed computing architecture needs to provide an authentication mechanism to judge the identity of the node,thereby ensuring that the data cannot be obtained by other nodes during the transmission process.None of the identity authentication mechanisms existing in the traditional computing model can effectively solve the identity authentication problem in the dispersed computing architecture.In response to the above problems,this thesis combines the similarities and differences of the cloud side environment to study the lack or insufficiency of the identity authentication mechanism in the dispersed computing architecture,rationally use the existing algorithms,and propose a hierarchical dispersed computing security Architecture,and then designed an identity-based authentication mechanism based on this architecture.This mechanism greatly shortens the length of the key and can effectively solve the identity authentication problem within and between subnets in the dispersed computing architecture.It provides a secure foundation for the trusted sharing scheme.In order to ensure the security of data in storage or sharing,a reliable data sharing scheme needs to be provided in the dispersed computing architecture.At this stage,in order to ensure the security of data storage,the data will be encrypted and stored,but when the encrypted data is shared,the authorized access node must obtain the decryption key of the data.Therefore,this thesis designs a data sharing based on the identity authentication mechanism.Scheme,the scheme introduces proxy re-encryption technology to effectively manage and distribute keys,and can ensure the integrity and reliability of shared data,and solve the problem of trusted sharing of data within and between subnets in the dispersed computing architecture.problem.This thesis designs and implements a trusted sharing system based on a dispersed computing architecture.The test results show that the system can complete authentication and data sharing operations with low node consumption,thereby solving the problem of identity authentication and data sharing in the dispersed computing architecture.
Keywords/Search Tags:Dispersed computing model, Identity authentication, Trusted sharing, Proxy reencryption, Security architecture
PDF Full Text Request
Related items