Skip to main content

Identity Authentication Under Internet of Everything Based on Edge Computing

  • Conference paper
  • First Online:
Trusted Computing and Information Security (CTCIS 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1149))

Included in the following conference series:

Abstract

With the rapid development of the Internet, the application of the Internet of things and big data is more and more extensive. The era of Internet of everything (IoE) has come, and the traditional cloud computing model has been unable to efficiently process the massive data generated by a large number of edge devices. Therefore, edge-type big data processing which is oriented to massive data computing generated by network edge devices—edge computing comes into being. However, due to the complexity of edge computing, data security and privacy issues become more prominent. Aiming at the security authentication of edge equipment under the Internet of everything, this paper designs an identity authentication framework under the Internet of everything based on edge computing. In the framework, multi-factor identity authentication is applied to solve the weakness of edge equipment security authentication. Moreover, the software defined network technology (SDN) is adopted to realize the global management of the deployment and application of a large number of edge equipment, which can effectively realize the effective security protection of the Internet of everything. In the end, the formalized verification of the identity authentication process of the designed framework is carried out.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shi, W., Sun, H., Cao, J., et al.: Edge computing: a new computing model in the Internet of everything era. Comput. Res. Dev. 54(5), 907–924 (2017)

    Google Scholar 

  2. Cisco Global Cloud Index: Forecast and Methodology, 2016–2021 White Paper, 01 February 2018. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/global-cloud-index-gci/white-paper-c11-738085.html

  3. Cisco cloud index supplement. Cloud readiness regional details white paper (2017)

    Google Scholar 

  4. Evans, D.: The Internet of everything: how more relevant and valuable connections will change the world. Cisco IBSG 2012, 1–9 (2012)

    Google Scholar 

  5. Zhang, J., Zhao, Y., Chen, B., Hu, F., Zhu, K.: Research review on edge computing data security and privacy protection. J. Commun. 39(03), 1–21 (2008)

    Google Scholar 

  6. An, X., Cao, G., Miao, L., Ren, S., Lin, F.: Security review of intelligent edge computing. Telecommun. Sci. 34(07), 135–147 (2018)

    Google Scholar 

  7. Han, W., Xue, J., Wang, Y., Liu, Z., Kong, Z.: MalInsight: a systematic profiling based malware detection framework. J. Netw. Comput. Appl. (125), 236–250 (2019). ISSN 1084-8045, https://doi.org/10.1016/j.jnca.2018.10.022

    Article  Google Scholar 

  8. Han, W., Xue, J., Wang, Y., Huang, L., Kong, Z., Mao, L.: MalDAE: detecting and explaining malware based on correlation and fusion of static and dynamic characteristics. Comput. Secur. (83), 208–233 (2019). ISSN 0167-4048, https://doi.org/10.1016/j.cose.2019.02.007

    Article  Google Scholar 

  9. Bangui, H., Rakrak, S., Raghay, S., et al.: Moving to the edge-cloud-of-things: recent advances and future research directions. Electronics 7, 309 (2018)

    Article  Google Scholar 

  10. Liu, J., Ming, M., Wang, H., et al.: Optimization method of attribute-based ciphertext access control for mobile cloud. J. Commun. 39(373) (7), 43–53 (2018)

    Google Scholar 

  11. Roy, S., Chatterjee, S., Das, A.K., et al.: On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services. IEEE Access 5, 25808–25825 (2017)

    Article  Google Scholar 

  12. Badr, A.M., Zhang, Y., Gulfam, H., Umar, A.: Dual authentication-based encryption with a delegation system to protect medical data in cloud computing. Electronics 8, 171 (2019). https://doi.org/10.3390/electronics8020171

    Article  Google Scholar 

  13. Jin, B.W., Park, J.O., Mun, H.J.: A design of secure communication protocol using RLWE-based homomorphic encryption in IoT convergence cloud environment. Wirel. Pers. Commun. 105, 599–618 (2018)

    Article  Google Scholar 

  14. Dhillon, P.K., Kalra, S.: Multi-factor user authentication scheme for IoT-based healthcare services. J. Reliab. Intell. Environ. 4(3), 141–160 (2018)

    Article  Google Scholar 

  15. Zhang, X., Shao, Y., Sun, C.: Overall design of smart transportation for future cities. Urban Transp. (05), 1–7 (2018)

    Google Scholar 

  16. Mei, H.: Everything can be connected and everything can be programmed. Fangyuan (12), 58–59 (2018)

    Google Scholar 

  17. Liu, J., Xiao, Y., Chen, C.L.P.: Authentication and access control in the internet of things. In: International Conference on Distributed Computing Systems Workshops. IEEE Computer Society (2012)

    Google Scholar 

  18. He, W., Golla, M., Padhi, R., Ofek, J., DĂĽrmuth, M., Fernandes, E., Ur, B.: Rethinking access control and authentication for the home internet of things (IoT). In: Proceedings of USENIX Security Symposium (2018)

    Google Scholar 

  19. Tu, Y., Dong, Z., Yang, H.: Key technologies and application of edge computing. ZTE Commun. 15(02), 26–34 (2017)

    Google Scholar 

  20. Wang, F., Wen, H., Chen, S., Chen, L., Hou, W.: Protection method of mobile intelligent terminal privacy data under edge computing. Cyberspace Secur. 9(02), 47–50 (2018)

    Google Scholar 

  21. Chen, Z., Guo, B., Zhang, Y.: MEC technology scheme and application analysis of 5G network edge computing. Mob. Commun. 42(07), 34–38 (2018)

    Google Scholar 

  22. Qin, H., Liu, L.: Research on decentralized SDN access identity authentication. Appl. Comput. Syst. 27(9), 243–248 (2018). http://www.c-s-a.org.cn/1003-3254/6509.html

  23. Xu, F., Ye, H., Cui, S., Zhao, C., Yao, H.: Software defined industrial network architecture for edge computing offloading [J/OL]. J. China Univ. Posts Telecommun. 1–9 (2018). https://doi.org/10.19682/j.cnki.1005-8885.2018.0030

  24. Tian, Y., Zhang, N., Lin, Y.-H., Wang, X., Ur, B., Guo, X., Tague, P.: SmartAuth: user-centered authorization for the internet of things. In: Proceedings of the USENIX Security Symposium (2017)

    Google Scholar 

  25. Wang, M.: A three-factor two-way identity authentication scheme in mobile internet. In: Proceedings of 2017 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017), Research Institute of Management Science and Industrial Engineering: Computer Science and Electronic Technology International Society, p. 5 (2017)

    Google Scholar 

  26. He, W., et al.: Rethinking access control and authentication for the home internet of things (IoT). In: Proceedings of the USENIX Security Symposium (2018)

    Google Scholar 

  27. Dong, H., Zhang, H., Li, Z., Liu, H.: Computational unloading of service workflow in mobile edge computing environment [J/OL]. Comput. Eng. Appl. 1–12 (2018). http://kns.cnki.net/kcms/detail/11.2127.TP.20181101.1416.033.html

  28. Zhao, Y., Zhang, X.: New media identity authentication and traffic optimization in 5G network. In: 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 1331–1334 (2017)

    Google Scholar 

  29. Fan, X., Lu, Z., Ju, L.: Security of SDN southbound channel. J. Beijing Univ. Electron. Sci. Technol. 24(04), 15–20 (2016)

    Google Scholar 

Download references

Acknowledgement

This work was supported by the National Key Research & Development Program of China (2016QY06X1205).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zixiao Kong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kong, Z., Xue, J., Wang, Y., Han, W., Liu, X. (2020). Identity Authentication Under Internet of Everything Based on Edge Computing. In: Han, W., Zhu, L., Yan, F. (eds) Trusted Computing and Information Security. CTCIS 2019. Communications in Computer and Information Science, vol 1149. Springer, Singapore. https://doi.org/10.1007/978-981-15-3418-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-3418-8_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-3417-1

  • Online ISBN: 978-981-15-3418-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics