Secure and Trusted Authentication Model Under Edge Computing and Multi-blockchain

Published: 2023-03-01  ·  Last modified: 2023-03-02

Journal of Frontiers of Computer Science & Technolog [CCF T2] 2023

DOI: 10.3778/j.issn.1673-9418.2206011

Minmin Huang , Lingyun Yuan# , Xue Pan , Jie Zhang

Blockchain Data Security Access Control IoT Edge Computing ABAC Trust Management

Projects: 202101AT070098 62262073

Links:   [PDF] [DOI]

Cover image

Abstract:

Issues such as data security and privacy protection caused by the edge computing model are fundamental problems that restrict the development of edge computing, while blockchain is limited in solving security problems in edge computing due to its own scalability bottleneck. In order to solve the trust management at the edge side and the scalability of blockchain, and promote the synergistic development of edge computing and blockchain, this paper proposes a distributed secure and trusted authentication model based on edge computing with master-slave multiple chains. Firstly, a master-slave multi-chain structure is designed based on traditional single chain and a three-tier architecture is deployed by integrating edge computing. A signature authentication scheme for edge computing security based on elliptic curve cryptography (ECC) integrated with blockchain cryptography is also proposed. Secondly, an inter domain-role-based access control (ID-RBAC) is constructed based on role-based access control(RBAC) combined with smart contracts for fine-grained division of user privileges, and a detailed access authen-tication process within and between domains is given. Experimental results show that the model is secure and trust-worthy, and the storage overhead of this scheme is reduced by about 50% on average and the latency is signi-ficantly reduced, compared with the single-chain architecture of traditional deployment methods. Compared with existing methods, the proposed scheme in this paper has greater superiority in throughput, with the ratio of sending rate to throughput reaching 1:1, which can meet the demand of large-scale IoT practical applications with high scalability and high security.

Congratulations!!!

As of November 2023, our paper was selected as a Highly Downloaded Paper on CNKI.