Abstract
With the rapid development of the Internet, the application of the Internet of things and big data is more and more extensive. The era of Internet of everything (IoE) has come, and the traditional cloud computing model has been unable to efficiently process the massive data generated by a large number of edge devices. Therefore, edge-type big data processing which is oriented to massive data computing generated by network edge devices—edge computing comes into being. However, due to the complexity of edge computing, data security and privacy issues become more prominent. Aiming at the security authentication of edge equipment under the Internet of everything, this paper designs an identity authentication framework under the Internet of everything based on edge computing. In the framework, multi-factor identity authentication is applied to solve the weakness of edge equipment security authentication. Moreover, the software defined network technology (SDN) is adopted to realize the global management of the deployment and application of a large number of edge equipment, which can effectively realize the effective security protection of the Internet of everything. In the end, the formalized verification of the identity authentication process of the designed framework is carried out.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shi, W., Sun, H., Cao, J., et al.: Edge computing: a new computing model in the Internet of everything era. Comput. Res. Dev. 54(5), 907–924 (2017)
Cisco Global Cloud Index: Forecast and Methodology, 2016–2021 White Paper, 01 February 2018. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/global-cloud-index-gci/white-paper-c11-738085.html
Cisco cloud index supplement. Cloud readiness regional details white paper (2017)
Evans, D.: The Internet of everything: how more relevant and valuable connections will change the world. Cisco IBSG 2012, 1–9 (2012)
Zhang, J., Zhao, Y., Chen, B., Hu, F., Zhu, K.: Research review on edge computing data security and privacy protection. J. Commun. 39(03), 1–21 (2008)
An, X., Cao, G., Miao, L., Ren, S., Lin, F.: Security review of intelligent edge computing. Telecommun. Sci. 34(07), 135–147 (2018)
Han, W., Xue, J., Wang, Y., Liu, Z., Kong, Z.: MalInsight: a systematic profiling based malware detection framework. J. Netw. Comput. Appl. (125), 236–250 (2019). ISSN 1084-8045, https://doi.org/10.1016/j.jnca.2018.10.022
Han, W., Xue, J., Wang, Y., Huang, L., Kong, Z., Mao, L.: MalDAE: detecting and explaining malware based on correlation and fusion of static and dynamic characteristics. Comput. Secur. (83), 208–233 (2019). ISSN 0167-4048, https://doi.org/10.1016/j.cose.2019.02.007
Bangui, H., Rakrak, S., Raghay, S., et al.: Moving to the edge-cloud-of-things: recent advances and future research directions. Electronics 7, 309 (2018)
Liu, J., Ming, M., Wang, H., et al.: Optimization method of attribute-based ciphertext access control for mobile cloud. J. Commun. 39(373) (7), 43–53 (2018)
Roy, S., Chatterjee, S., Das, A.K., et al.: On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services. IEEE Access 5, 25808–25825 (2017)
Badr, A.M., Zhang, Y., Gulfam, H., Umar, A.: Dual authentication-based encryption with a delegation system to protect medical data in cloud computing. Electronics 8, 171 (2019). https://doi.org/10.3390/electronics8020171
Jin, B.W., Park, J.O., Mun, H.J.: A design of secure communication protocol using RLWE-based homomorphic encryption in IoT convergence cloud environment. Wirel. Pers. Commun. 105, 599–618 (2018)
Dhillon, P.K., Kalra, S.: Multi-factor user authentication scheme for IoT-based healthcare services. J. Reliab. Intell. Environ. 4(3), 141–160 (2018)
Zhang, X., Shao, Y., Sun, C.: Overall design of smart transportation for future cities. Urban Transp. (05), 1–7 (2018)
Mei, H.: Everything can be connected and everything can be programmed. Fangyuan (12), 58–59 (2018)
Liu, J., Xiao, Y., Chen, C.L.P.: Authentication and access control in the internet of things. In: International Conference on Distributed Computing Systems Workshops. IEEE Computer Society (2012)
He, W., Golla, M., Padhi, R., Ofek, J., DĂĽrmuth, M., Fernandes, E., Ur, B.: Rethinking access control and authentication for the home internet of things (IoT). In: Proceedings of USENIX Security Symposium (2018)
Tu, Y., Dong, Z., Yang, H.: Key technologies and application of edge computing. ZTE Commun. 15(02), 26–34 (2017)
Wang, F., Wen, H., Chen, S., Chen, L., Hou, W.: Protection method of mobile intelligent terminal privacy data under edge computing. Cyberspace Secur. 9(02), 47–50 (2018)
Chen, Z., Guo, B., Zhang, Y.: MEC technology scheme and application analysis of 5G network edge computing. Mob. Commun. 42(07), 34–38 (2018)
Qin, H., Liu, L.: Research on decentralized SDN access identity authentication. Appl. Comput. Syst. 27(9), 243–248 (2018). http://www.c-s-a.org.cn/1003-3254/6509.html
Xu, F., Ye, H., Cui, S., Zhao, C., Yao, H.: Software defined industrial network architecture for edge computing offloading [J/OL]. J. China Univ. Posts Telecommun. 1–9 (2018). https://doi.org/10.19682/j.cnki.1005-8885.2018.0030
Tian, Y., Zhang, N., Lin, Y.-H., Wang, X., Ur, B., Guo, X., Tague, P.: SmartAuth: user-centered authorization for the internet of things. In: Proceedings of the USENIX Security Symposium (2017)
Wang, M.: A three-factor two-way identity authentication scheme in mobile internet. In: Proceedings of 2017 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017), Research Institute of Management Science and Industrial Engineering: Computer Science and Electronic Technology International Society, p. 5 (2017)
He, W., et al.: Rethinking access control and authentication for the home internet of things (IoT). In: Proceedings of the USENIX Security Symposium (2018)
Dong, H., Zhang, H., Li, Z., Liu, H.: Computational unloading of service workflow in mobile edge computing environment [J/OL]. Comput. Eng. Appl. 1–12 (2018). http://kns.cnki.net/kcms/detail/11.2127.TP.20181101.1416.033.html
Zhao, Y., Zhang, X.: New media identity authentication and traffic optimization in 5G network. In: 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 1331–1334 (2017)
Fan, X., Lu, Z., Ju, L.: Security of SDN southbound channel. J. Beijing Univ. Electron. Sci. Technol. 24(04), 15–20 (2016)
Acknowledgement
This work was supported by the National Key Research & Development Program of China (2016QY06X1205).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kong, Z., Xue, J., Wang, Y., Han, W., Liu, X. (2020). Identity Authentication Under Internet of Everything Based on Edge Computing. In: Han, W., Zhu, L., Yan, F. (eds) Trusted Computing and Information Security. CTCIS 2019. Communications in Computer and Information Science, vol 1149. Springer, Singapore. https://doi.org/10.1007/978-981-15-3418-8_6
Download citation
DOI: https://doi.org/10.1007/978-981-15-3418-8_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3417-1
Online ISBN: 978-981-15-3418-8
eBook Packages: Computer ScienceComputer Science (R0)