Font Size: a A A

Research On Privacy-Enhanced Trusted Authentication Under Edge IoT

Posted on:2024-07-25Degree:MasterType:Thesis
Country:ChinaCandidate:M M HuangFull Text:PDF
GTID:2568307121483464Subject:Master of Electronic Information (Professional Degree)
Abstract/Summary:PDF Full Text Request
As more and more people embrace smart products and demand for them continues to grow,Internet of Things(Io T)technology has created a vast landscape for the co-engagement of humans,data and processes.With the traditional cloud-centric service model unable to meet the real-time demands of many-to-many applications between Io T devices and cloud servers,a new paradigm of edge computing has emerged to provide users with a solution that blends the advantages of cloud and Io T.However,the paradigm of edge-side computing is prone to internal and external attacks,data security and privacy protection,and other fundamental issues that constrain its development in Io T scenarios.Blockchains based on cryptographic algorithms,consensus mechanisms,etc.are highly promising solutions for security,often applied to distributed secure authentication mechanisms and de-trusted access control models.However,the performance limitations of authentication and access control solutions,which are affected by the blockchain scalability bottleneck,become one of the challenges for them to provide high quality services for Io T applications.In addition,the network-wide public consensus approach and immutable nature of blockchain ledgers pose security risks for access,so research on privacy and scalability of blockchain systems still needs to be focused.Therefore,with the interaction of heterogeneous edge nodes and service migration across edge nodes,the scalability and privacy of distributed architectures still have greater possibilities.This paper proposes a cross-domain access control model based on privacy enhancement and trust authentication for blockchain and edge computing,and the main research work and results are as follows:(1)Integrating edge computing and block master-slave multi-chain to build a three-tier distributed and trusted architecture(E-MSC),providing security services from different levels such as storage,network and computing.To address the scalability bottleneck of the blockchain,an infinitely scalable master-slave multi-chain structure is designed based on the scaling method,and the master chain is load-balanced by the slave chain to reduce the transaction burden of the system.Based on Elliptic Curve Cryptography(ECC),it accesses edge nodes to defend against external security attacks from malicious nodes at the edge;it designs a trust assessment mechanism to address the problem that the trustworthiness of edge nodes cannot be guaranteed and the reliability of interaction between nodes cannot be confirmed in the traditional architecture.Compared with the traditional single-chain architecture deployment,the storage overhead of the multi-chain structure is reduced by 50% on average,and the latency is also significantly reduced.The performance of the deployed distributed trusted architecture is excellent,with 1.7 times the throughput of the conventional architecture,95.43% reduction in maximum latency and 92.75% reduction in average latency.(2)In response to the problem of untrusted cross-domain environment and difficult management of polymorphic user identities,Inter domain-role-based access control(ID-RBAC)is proposed to provide a secure and efficient architecture for cross-domain trusted authentication model.The intra-domain and inter-domain access control mechanism is designed through role authorization combined with smart contracts,enabling automatic and intelligent fine-grained division of permissions to meet the functions of identity registration,authentication,association and cross-domain access.As the access level increases,the response efficiency of access transactions performed under this model gradually increases,and the response efficiency increases linearly for a continuous number of normal accesses,which can meet the practical requirements of large-scale Io T applications.The response efficiency increases linearly for a sustained number of normal accesses,meeting the needs of large-scale Io T applications.(3)A privacy-enhanced cross-domain sharing scheme based on trust and roles is proposed to design an access control model(TCD-RBAC)that supports fine-grained,dynamically updated permissions.Based on smart contracts,role mapping rules are developed to satisfy the many-to-many relationship of cross-domain users and role permissions,and access rights of list users are dynamically updated based on node and domain trust values.In response to the traditional public blockchain privacy protection problem,a merged searchable encryption(MSE)is designed based on public key encryption and symmetric encryption to enable many-to-many mapping of roles and search permissions.Compared with traditional RBAC,this solution improves access dynamic adaptability by 74.8% and reduces CPU usage by 24.6% on average.It also gains a 2x throughput advantage over existing schemes with maximum commit success rate,demonstrating strong scalability and is suitable for edge Io T application scenarios with high privacy and performance requirements.
Keywords/Search Tags:Blockchain, Internet of things, Edge computing, Trust management, Access control
PDF Full Text Request
Related items