An Efficient and Privacy Protection Authentication Protocol for Edge Computing

被引:0
|
作者
Luo, Yi [1 ,2 ]
Hu, Houpeng [3 ]
Qian, Bin [1 ,2 ]
Gao, Zhenghao [3 ]
Xiao, Yong [1 ,2 ]
Ou, Jiaxiang [3 ]
He, Peilin [3 ]
机构
[1] Institute of Metrology Technology Electric Power Research Institute, CSG, China
[2] Guangdong Provincial Key Laboratory of Intelligent Measurement and Advanced Metering of Power Grid, China
[3] Guizhou Power Grid Co., LTD, China
来源
Journal of Network Intelligence | 2022年 / 7卷 / 04期
关键词
Anonymity - Authentication protocols - Cloud-computing - Edge computing - Efficient protections - Privacy protection - Protection authentication - Resource Constraint - Security analysis - Security protocols;
D O I
暂无
中图分类号
学科分类号
摘要
Due to resource constraints, cloud computing has high latency and network instability. Along with it, fog computing and edge computing to alleviate the problems faced by cloud computing. Fog computing and edge computing can process resources in a lower network structure, especially edge computing can be closer to the user layer. To ensure the security of network communication in the edge computing environment, we propose an efficient authentication protocol that protects users’ privacy and can prove to be secure, which truly guarantees anonymity. The security analysis includes informal security analysis, Real-Or-Random (ROR) probability analysis and ProVerif verification tool. The performance analysis includes three aspects: security, computational cost and communication cost. By comparing with relevant protocols, it is proved that the proposed protocol not only has better security, but also ensures higher performance. © 2022 ISSN 2414-8105 (Online).
引用
收藏
页码:1032 / 1046
相关论文
共 50 条
  • [1] An efficient authentication protocol supporting privacy in mobile computing environments
    Park, SY
    Han, MS
    Eom, YI
    HSNMC 2002: 5TH IEEE INTERNATIONAL CONFERENCE ON HIGH SPEED NETWORKS AND MULTIMEDIA COMMUNICATIONS, 2002, : 332 - 334
  • [2] A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing
    Kaur, Kuljeet
    Garg, Sahil
    Kaddoum, Georges
    Guizani, Mohsen
    Jayakody, Dushantha Nalin K.
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [3] An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection
    Wei Zhang
    Sanya Liu
    Shengming Wang
    Baolin Yi
    Longkai Wu
    Wireless Personal Communications, 2017, 96 : 1215 - 1228
  • [4] An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection
    Zhang, Wei
    Liu, Sanya
    Wang, Shengming
    Yi, Baolin
    Wu, Longkai
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 1215 - 1228
  • [5] Security and privacy protection protocol based on edge computing in smart campus
    Liang, Jing
    Gong, Yan
    EXPERT SYSTEMS, 2025, 42 (01)
  • [6] A Multi-Server Authentication Protocol Achieving Privacy Protection and Traceability for 5G Mobile Edge Computing
    Lee, Junho
    Kim, Dongwook
    Park, Jinhyun
    Park, Hyungweon
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
  • [7] Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services
    Xiong L.
    Peng D.
    Peng T.
    Liang H.
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2019, 54 (01): : 202 - 210
  • [8] ROBUST AND PRIVACY PROTECTION AUTHENTICATION IN CLOUD COMPUTING
    Huang, Jheng-Jia
    Juang, Wen-Shenq
    Fan, Chun-I
    Liaw, Horng-Twu
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (11): : 4247 - 4261
  • [9] Efficient privacy protection authentication protocol for vehicle network in 5G
    Zhang, Guixian
    Zhao, Xiaoyu
    Chen, Menglu
    Ma, Shuyi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022,
  • [10] An Improvement on RFID Authentication Protocol with Privacy Protection
    Lee, Y. -C.
    Hsieh, Y. -C.
    You, P-S.
    Chen, T. -C.
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 569 - +