Universally Secure Device-to-Device Communications With Privacy Protection and Fine-Grained Access Control Based on 5G-Enabled Multi-Access Edge Computing

被引:0
|
作者
Hsu, Ruei-Hau [1 ]
Wang, Lu-Chin [1 ]
Fan, Hsiang-Shian [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 804, Taiwan
关键词
device-to-device communications; proximity service; privacy; multi-access edge computing; 5G; fine-grained access control; attribute based encryption; hidden policy; D2D COMMUNICATION; ENCRYPTION;
D O I
10.6688/JISE.202305_39(3).0004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D) communications enable new user experiences and low latency in communications among devices for new IoT applications, such as augmented reality (AR), virtual reality (VR), public safety, based on the fifth-generation and beyond (B5G) mobile networks. However, typical D2D communications still rely on the assistance of a centralized component, i.e., proximity service (ProSe) application server, for access control during device discovery procedures in mobile networks. Moreover, D2D communications are mainly launched by certain apps running on user equipment (UE) and need to discover the other UE in the same proximity of a base station (i.e., gNB in 5G) according to the identity or the profile of each UE in an app. This procedure will inevitably disclose the user/application's sensitive information and behaviors to the infrastructures above to assist in establishing the corresponding D2D communications. Moreover, most of related works for secure D2D communication cannot support fine-grained access control and hidden policy during device discovery procedure simultaneously. Thus, this work proposes a new multi-access edge computing (MEC) based secure anonymous D2D communications system, so-called SAD2D, based on our newly proposed cooperative anonymous attribute-based encryption (CoAABE). The security proofs of the proposed fundamental CoAABE scheme and the SAD2D protocol are both provably secure. Additionally, this work conducts the performance evaluation for the SAD2D in the aspect of queueing model, which can reflect the effects of device discovery requests in certain arrival rates regarding the performance. Overall, this work paves the way to achieve fine-grain access controllable security and privacy protection simultaneously for secure D2D communications to B5G MEC-enabled IoT applications.
引用
收藏
页码:507 / 524
页数:18
相关论文
共 14 条
  • [1] SGD2 : Secure Group-based Device-to-Device Communications with Fine-grained Access Control for IoT in 5G
    Hsu, Ruei-Hau
    Fan, Hsiang-Shian
    Wang, Lu-Chin
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [2] EC-SVC: Secure CAN Bus In-Vehicle Communications With Fine-Grained Access Control Based on Edge Computing
    Yu, Donghyun
    Hsu, Ruei-Hau
    Lee, Jemin
    Lee, Sungjin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1388 - 1403
  • [3] A Study on M-CORD based Architecture in Traffic Offloading for 5G-enabled Multi-access Edge Computing Networks
    Srinivasan, Kathiravan
    Agrawal, Nitesh Kumar
    PROCEEDINGS OF 4TH IEEE INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION 2018 ( IEEE ICASI 2018 ), 2018, : 303 - 307
  • [4] AKMA for Secure Multi-access Edge Computing Mobility in 5G
    Akman, Gizem
    Ginzboorg, Philip
    Niemi, Valtteri
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2022 WORKSHOPS, PART IV, 2022, 13380 : 432 - 449
  • [5] Fine-Grained Offloading for Multi-Access Edge Computing with Actor-Critic Federated Learning
    Liu, Kai-Hsiang
    Hsu, Yi-Huai
    Lin, Wan-Ni
    Liao, Wanjiun
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [6] A Novel Attribute-based Access Control System for Fine-Grained Privacy Protection
    Son, Ha Xuan
    Nguyen Minh Hoang
    PROCEEDINGS OF 2019 THE 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2019) WITH WORKSHOP 2019 THE 4TH INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2019), 2019, : 76 - 80
  • [7] A Multi-Group-Supporting Policy Hidden Fine-Grained Data Sharing Scheme in 5G-Enabled IoT With Edge Computing
    Cai, Jiayin
    Zhang, Hongjie
    Duo, Zhilin
    Wang, Xuan
    Zhao, Xingwen
    IEEE ACCESS, 2024, 12 : 46362 - 46378
  • [8] ZONE-Based Multi-Access Edge Computing Scheme for User Device Mobility Management
    Lee, Juyong
    Kim, Daeyoub
    Lee, Jihoon
    APPLIED SCIENCES-BASEL, 2019, 9 (11):
  • [9] A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing
    Zhang, Zhishuo
    Huang, Wen
    Zhou, Shijie
    Liao, Yongjian
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 129
  • [10] Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications
    Roy, Sandip
    Das, Ashok Kumar
    Chatterjee, Santanu
    Kumar, Neeraj
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (01) : 457 - 468