Font Size: a A A

Research On Cloud-Assisted Io T Identity Authentication Scheme Based On Blockchain

Posted on:2022-12-19Degree:MasterType:Thesis
Country:ChinaCandidate:J L ZouFull Text:PDF
GTID:2518306767464284Subject:Automation Technology
Abstract/Summary:PDF Full Text Request
Cloud-assisted Internet of Things(IoT),as a new paradigm in cloud computing and IoT environments,can provide users with solutions that integrate the advantages of cloud computing and IoT.Authentication and access control can solve the problems of cloud data being easily tampered with,data leakage,and unauthorized access to data and IoT devices under this new paradigm.The authentication and access control scheme in the cloud-assisted IoT environment needs to consider the requirements of one-to-many and many-to-many access between IoT devices and cloud computing servers and needs to consider the protection against various attacks.In view of one-to-many and many-to-many access requirements between IoT devices and cloud computing servers,since the Multi-Receiver Encryption(MRE)schemes can realize secure transmission from one sender to multiple receivers,the authentication scheme can implement one-to-many and many-to-many access control using an MRE scheme.In view of the security risks such as the cloud database being easily tampered with and attacked,and the data sharing and synchronization of IoT devices being difficult to achieve,the authentication scheme can use the reliability,decentralization,and transparency of the blockchain to achieve secure data sharing.At the same time,Physical Unclonable Function(PUF)can be used to implement secure authentication and key protection for IoT devices.However,there are still some shortcomings in the current authentication and access control schemes:for example,there are few cloud-assisted IoT authentication schemes designed with MRE,blockchain,and PUF technologies,and they are still insufficient in terms of compliance,security and performance;the research on MRE schemes based on SM2 elliptic curve public-key cryptography is still in a blank state.Therefore,it is urgent to study the MRE scheme based on the Chinese National Commercial Cryptographic Algorithm and the authentication and access control scheme in the cloud-assisted IoT scenario.Given the above requirements and the shortcomings of existing schemes,this paper intends to design a Certificateless SM2-based Multi-receiver Encryption(CL-SM2-MRE)scheme and a cloud-assisted IoT authentication scheme.The main contributions of this paper are as follows:1.This paper designed a certificateless SM2-based multi-receiver encryption scheme,which realizes the self-controllable one-to-many secure data transmission,and proved the confidentiality and receiver anonymity of the CL-SM2-MRE scheme under the random oracle model;2.This paper proposed a blockchain-based cloud-assisted IoT authentication scheme for multi-server environments.The scheme uses the designed CL-SM2-MRE scheme to achieve one-to-many and many-to-many access control and uses the PUF to realize the key protection of the IoT device.At the same time,this paper presents the security analysis of the authentication scheme with a list of games;3.This paper conducted a comparative analysis of the proposed CL-SM2-MRE and authentication scheme and conducts experiments on the two schemes in the PC and Raspberry Pi environments,which further confirms the feasibility of the proposed scheme.
Keywords/Search Tags:Cloud-Assisted IoT, SM2 Digital Signature Algorithm, Certificateless Multi-Receiver Encryption, Authentication, Blockchain
PDF Full Text Request
Related items