全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

边缘计算环境下基于区块链的双因子跨域认证
Two-Factor Cross-Domain Authentication Based on Blockchain in Edge Computing Environment

DOI: 10.12677/CSA.2021.117189, PP. 1845-1852

Keywords: 边缘计算,区块链,跨域认证,模糊提取
Edge Computing
, Blockchain, Cross-Domain Authentication, Fuzzy Extraction

Full-Text   Cite this paper   Add to My Lib

Abstract:

本文针对边缘计算环境下用户间跨域认证与密钥协商问题,基于区块链技术,利用口令的简便性及生物特征的唯一性设计跨域协议。该协议融入了模糊提取技术,提高了用户在认证密钥协商阶段的安全性和便捷性。协议中用户端选取性能高的边缘设备完成注册及认证过程,实现了用户在边缘认证服务器和区块链处的双重认证,在保障用户之间安全通信的同时减轻了云端的网络负担。此外,本文分析了协议满足的安全属性,且本文方案通信消耗较低。
Aiming at the problem of user-to-user authentication and key agreement of cross-domain in edge computing environment, a cross-domain is proposed under the blockchain technology with the simplicity of password and the unique identification of biometric features. The protocol enhances the security and convenience of user-to-user authentication and key agreement phase by using fuzzy extraction technology. The edge devices with high performance are selected to complete the registration and authentication process. And the authentications of the user in the edge server and the blockchain are realized, which ensures the security communication of user-to-user and reduces the network burden of the cloud. In addition, the security of the protocol satisfies is analyzed and lower communication cost is required in the proposed scheme.

References

[1]  周俊, 沈华杰, 林中允, 等. 边缘计算隐私保护研究进展[J]. 计算机研究与发展, 2020, 57(10): 2027-2051.
[2]  Satyanarayanan, M. (2017) The Emergence of Edge Computing. Computer, 50, 30-39.
https://doi.org/10.1109/MC.2017.9
[3]  丁永善, 李立新, 李作辉. 基于证书的匿名跨域认证方案[J]. 网络与信息安全学报, 2018, 4(5): 32-38.
[4]  吴卫. 边缘计算环境下物联网身份认证与隐私保护技术研究[D]: [硕士学位论文]. 西安: 西安电子科技大学, 2019.
[5]  马晓婷. 基于区块链技术的证书管理与跨域认证方案[D]: [硕士学位论文]. 西安: 西安电子科技大学, 2019.
[6]  Yao, Y., Chang, X., Misc, J., et al. (2019) BLA: Block-chain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services. IEEE Internet of Things Journal, 6, 3775-3784.
https://doi.org/10.1109/JIOT.2019.2892009
[7]  Guo, S., Hu, X., Guo, S., et al. (2019) Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System. IEEE Transactions on Industrial Informatics, 16, 1972-1983.
[8]  张金花, 李晓伟, 曾新, 等. 边缘计算环境下基于区块链的跨域认证与密钥协商协议[J]. 信息安全学报, 2021, 6(1): 54-61.
[9]  帕尔, 佩尔茨尔. 深入浅出密码学–常用加密技术原理与应用[M]. 马小婷, 译. 北京: 清华大学出版社, 2012: 204-205.
[10]  Dodis, Y., Reyzin, L., Smith, A., et al. (2004) Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Theory and Application of Cryptographic Techniques, 2004, 523-540.
https://doi.org/10.1007/978-3-540-24676-3_31
[11]  威廉?斯托林斯. 密码编码学与网络安全: 原理与实践[M]. 第八版. 陈晶, 等, 译. 北京: 北京工业出版社, 2021: 204-206.
[12]  邓上煜, 魏周思宇, 吴鹏程. 关于区块链技术的研究与分析[J]. 科技风, 2019, 382(14): 90.
[13]  Canetti, R. and Krawczyk, H. (2001) Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. Lecture Notes in Computer Science. Springer Berlin Heidelberg, Berlin, 453-474.
https://doi.org/10.1007/3-540-44987-6_28
[14]  谭琛, 陈美娟, Amuah, 等. 基于区块链的分布式物联网设备身份认证机制研究[J]. 物联网学报, 2020, 4(2): 71-78.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133