Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT

被引:31
作者
Cui, Jie [1 ,2 ,3 ]
Wang, Fengqun [1 ,2 ,3 ]
Zhang, Qingyang [1 ,2 ,3 ]
Xu, Yan [1 ,2 ,3 ]
Zhong, Hong [1 ,2 ,3 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Minist Educ, Key Lab Intelligent Comp & Signal Proc, Hefei 230039, Peoples R China
[2] Anhui Univ, Inst Phys Sci & Informat Technol, Hefei 230039, Peoples R China
[3] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Servers; Cloud computing; Internet; Production facilities; Encryption; Edge computing; Group signature; industrial internet of things (IIoT); proxy reencryption; publish; subscribe service; security;
D O I
10.1109/TIE.2020.3039227
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As internet of things and other technologies are widely used in industrial manufacturing, automation and intelligence have witnessed rapid developments, resulting in the proposal of the industrial internet of things (IIoT). However, the IIoT still faces various network security threats; hence, data integrity, confidentiality, and anonymity need to be ensured. The use of cloud and edge servers as semitrusted third parties often results in the leaking of privacy sensitive user data. Meanwhile, existing security schemes treat the cloud and edge as fully trusted entities, which is not always valid. Considering edge servers as semitrusted entities, we propose a novel message authentication scheme that leverages group signature technology and proxy reencryption technology to ensure data integrity, confidentiality, and anonymity. Through theoretical analysis and performance comparison, we prove the security of our scheme. In addition, we implement our scheme on a real publish/subscribe system, and the experimental results show the feasibility of our scheme.
引用
收藏
页码:12921 / 12929
页数:9
相关论文
共 32 条
[21]  
Shen Y, 2018, BLOCKCHAIN BASED SYS, P62
[22]   Edge Computing: Vision and Challenges [J].
Shi, Weisong ;
Cao, Jie ;
Zhang, Quan ;
Li, Youhuizi ;
Xu, Lanyu .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (05) :637-646
[23]  
Stanford-Clark A., 2013, Int. Bus. Mach. Corp.
[24]   Secure integration of IoT and Cloud Computing [J].
Stergiou, Christos ;
Psannis, Kostas E. ;
Kim, Byung-Gyu ;
Gupta, Brij .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :964-975
[25]   Recent security challenges in cloud computing [J].
Subramanian, Nalini ;
Jeyaraj, Andrews .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 71 :28-42
[26]   A survey of security solutions for distributed publish/subscribe systems [J].
Uzunov, Anton V. .
COMPUTERS & SECURITY, 2016, 61 :94-129
[27]   Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure [J].
Wang, Jing ;
Wu, Libing ;
Choo, Kim-Kwang Raymond ;
He, Debiao .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) :1984-1992
[28]   Internet of Things in Industries: A Survey [J].
Xu, Li Da ;
He, Wu ;
Li, Shancang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (04) :2233-2243
[29]   PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks [J].
Zhang, Jing ;
Cui, Jie ;
Zhong, Hong ;
Chen, Zhili ;
Liu, Lu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (02) :722-735
[30]   How Edge Computing and Initial Congestion Window Affect Latency of Web-based Services: Early Experiences with Baidu? [J].
Zhang, Qingyang ;
Zhong, Hong ;
Wu, Jiaoren ;
Shi, Weisong .
2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, :393-398