Edge-cloud collaboration,as the leader of emerging technologies,is gradually becoming the key to digital development in all walks of life.Especially,driven by new information technologies such as the Internet of Things,artificial intelligence and big data,edge-cloud collaborative application scenario shows its strong adaptation ability.The development of edge-cloud collaboration has brought great convenience to users,but it also faces severe challenges in the aspects of terminal privacy protection and secure transmission of information among terminals.In view of the above requirements,this paper studies the group key agreement technology that meets the fine-grained group communication of terminal security from the aspects of terminal resource limitation,terminal legalization authentication,terminal cross-group communication and terminal permission update.The main work of this thesis is as follows:(1)Aiming at the resource limitations of mobile devices in edge-cloud collaborative environment,such as weak computing power,small storage capacity and limited communication range,a group key agreement protocol among mobile terminals with limited resources is proposed.In this protocol,asymmetric group key agreement is used to realize the unconstrained group communication mechanism for message senders.The protocol utilizes the edge-cloud collaborative computing environment to transfer the computing and communication tasks of mobile devices to edge nodes so as to realize the lightweight load of mobile devices.Terminal devices participating in group key agreement can verify the validity of group session key without additional calculation.Based on the difficulty assumption of bilinear inverse Diffie-Hellman problem,it is proved that the protocol can resist passive attack.By evaluating the performance of the protocol,it can be found that the protocol has high efficiency in terms of computing time consumption,computing energy consumption and communication energy consumption.(2)Aiming at the different requirements of the security level of information shared by intelligent terminals and resource sharing permission of intelligent terminals in edge-cloud collaborative environment,a hierarchical dynamic group key agreement protocol based on privacy protection is proposed.This protocol proposes an identity authentication technology with hidden attributes,which can not only realize secure identity authentication but also protect the privacy information of intelligent terminals from being leaked.Only intelligent terminals that meet group permissions can participate in group key agreement,which improves group communication security.Low-level group terminals that meet certain conditions can apply for new attribute rights to participate in high-level group communication.High-level group terminals can also participate in low-level group communication through permission authentication,which increases the flexibility and security of intelligent terminal communication.In addition,the protocol also supports the self-verification of group session keys.Under the Diffie-Hellman hard problem hypothesis,it is proved that the protocol has high security.Compared with the existing literature,this protocol has great advantages in terms of performance.(3)Aiming at the problems of secure communication,information exchange and resource sharing among multi-domain terminals in edge-cloud collaborative application scenario,a fine-grained group key agreement protocol with revocation of permissions is proposed to establish a secure communication channel among group terminals in application scenarios.A key verification algorithm is proposed to solve the hidden danger caused by key generation and key distribution in traditional schemes.The identity authentication of terminal is realized by using hidden attribute authentication technology,and the identity and attribute information of terminal is not leaked.The combination of attribute-based encryption and Newton interpolation polynomial can support secure and fine-grained group key agreement.The immutable feature of blockchain technology ensures the integrity verification of terminal identity and communication information and the traceability of data.In addition,the protocol supports dynamic updating of attribute permissions to ensure the freshness of group keys.By comparison and analysis with references,this protocol has good performance in terms of calculation time,calculation energy consumption and communication energy consumption. |