...
首页> 外文期刊>Future generation computer systems >DecChain: A decentralized security approach in Edge Computing based on Blockchain
【24h】

DecChain: A decentralized security approach in Edge Computing based on Blockchain

机译:Decchain:基于区块链的边缘计算中的分散安全方法

获取原文
获取原文并翻译 | 示例
           

摘要

Security in edge computing paradigms has become a major concern in recent times due to the integral role it plays in the framework of edge computing. Privacy-preserving and data security challenges are among the many concerns impeding the goal of making data storage available and processing at the edge of the network quite difficult to implement. Authenticated users must be the only ones with access to their respective stored data which are protected against any form of intruder manipulation. Most authentication schemes proposed and implemented in edge computing and other paradigms use a trusted entity to initialize the authentication process between edge servers and prospective users. Servers and users are expected to register with the trusted party first before they are able to subsequently authenticate one another. The presence of the trusted party presents scalability issues as well as the threat of having a single point of failure which may threaten the availability of the entire network. In this paper, we present a fully decentralized approach to solving this problem by eliminating the public trusted entity within the network framework termed DecChain. In DecChain we employ some notable principles of permissioned blockchain technology in the rollout and authentication of elements within the network. Authenticated users within our proposed framework would not have to sign in to every service provider to be authenticated to access a service or resource. Security experiments and the deployment of our scheme are carried out to evaluate the performance of DecChain. The results show our scheme is secured and achieves the intended purpose efficiently.
机译:由于在边缘计算框架中扮演的积分作用,所以在边缘计算范例中的安全性已成为近期的主要问题。保护保留和数据安全挑战是阻碍了在网络边缘的数据存储和处理的目标中的许多问题中,很难实现。经过身份验证的用户必须是唯一可以访问其各自存储数据的唯一存储数据,这些数据受到任何形式的入侵者操作。在边缘计算和其他范例中提出和实现的大多数认证方案使用可信实体来初始化边缘服务器和潜在用户之间的身份验证过程。预计服务器和用户将在他们能够随后彼此身份验证之前首先与可信任的聚会注册。可信任的存在呈现可扩展性问题以及有一个故障的威胁可能会威胁到整个网络的可用性。在本文中,我们通过消除网络框架内被称为山雀内的公众可信实体来解决这一问题的完全分散的方法。在Decchain中,我们在卷展栏和网络内的元素的验证中采用了许可的区块链技术的一些显着原则。在我们建议的框架内的经过身份验证的用户不必登录每个服务提供商以进行身份​​验证以访问服务或资源。进行安全实验和我们计划的部署,以评估冠军的表现。结果表明我们的计划是有效的有效达到预期的目的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号