Advanced Search
Volume 44 Issue 12
Dec.  2022
Turn off MathJax
Article Contents
HE Xinfeng, TIAN Junfeng, LOU Jian. Collaborative Trustworthy Framework for Edge Computing[J]. Journal of Electronics & Information Technology, 2022, 44(12): 4256-4264. doi: 10.11999/JEIT211045
Citation: HE Xinfeng, TIAN Junfeng, LOU Jian. Collaborative Trustworthy Framework for Edge Computing[J]. Journal of Electronics & Information Technology, 2022, 44(12): 4256-4264. doi: 10.11999/JEIT211045

Collaborative Trustworthy Framework for Edge Computing

doi: 10.11999/JEIT211045
Funds:  The Natural Science Foundation of Hebei Province (F2016201064), The Natural Science Foundation of Hebei Institution (QN2018080)
  • Received Date: 2021-09-28
  • Accepted Date: 2021-12-09
  • Rev Recd Date: 2021-12-06
  • Available Online: 2021-12-18
  • Publish Date: 2022-12-16
  • In the edge computing environment, the edge nodes have various kinds, wide distribution range and great differences in working environment, which makes the data security guarantee become very complicated. It is difficult to evaluate the credibility of the data transmitted by nodes effectively, thus affecting the security of the entire edge computing environment. To solve the problem, a novel collaborative trustworthy framework for edge computing is presented in the paper. By using the advantage of trusted computing technology, the concept of Trusted Computing Base for Edge computing (ETCB) is introduced, algorithms of the constructing ETCB are given and a trusted data validation protocol for the edge computing is designed. Meanwhile, the correctness of the algorithms and the security analysis of the protocol are also given. The framework can realize the distributed trusted verification of data without changing the original edge computing mode.
  • loading
  • [1]
    施巍松, 孙辉, 曹杰, 等. 边缘计算: 万物互联时代新型计算模型[J]. 计算机研究与发展, 2017, 54(5): 907–924. doi: 10.7544/issn1000-1239.2017.20160941

    SHI Weisong, SUN Hui, CAO Jie, et al. Edge computing—an emerging computing model for the internet of everything era[J]. Journal of Computer Research and Development, 2017, 54(5): 907–924. doi: 10.7544/issn1000-1239.2017.20160941
    [2]
    张佳乐, 赵彦超, 陈兵, 等. 边缘计算数据安全与隐私保护研究综述[J]. 通信学报, 2018, 39(3): 1–21. doi: 10.11959/j.issn.1000-436x.2018037

    ZHANG Jiale, ZHAO Yanchao, CHEN Bing, et al. Survey on data security and privacy-preserving for the research of edge computing[J]. Journal on Communications, 2018, 39(3): 1–21. doi: 10.11959/j.issn.1000-436x.2018037
    [3]
    XIAO Yinhao, JIA Yizhen, LIU Chunchi, et al. Edge computing security: State of the art and challenges[J]. Proceedings of the IEEE, 2019, 107(8): 1608–1631. doi: 10.1109/JPROC.2019.2918437
    [4]
    ROMAN R, LOPEZ J, and MAMBO M. Mobile edge computing, fog et al. : A survey and analysis of security threats and challenges[J]. Future Generation Computer Systems, 2018, 78: 680–698. doi: 10.1016/j.future.2016.11.009
    [5]
    黄坚会, 沈昌祥, 谢文录. TPCM三阶三路安全可信平台防护架构[J]. 武汉大学学报:理学版, 2018, 64(2): 109–114. doi: 10.14188/j.1671-8836.2018.02.002

    HUANG Jianhui, SHEN Changxiang, and XIE Wenlu. The TPCM 3P3C defense architecture of safety and trusted platform[J]. Journal of Wuhan University:Natural Science Edition, 2018, 64(2): 109–114. doi: 10.14188/j.1671-8836.2018.02.002
    [6]
    何欣枫, 田俊峰, 刘凡鸣. 可信云平台技术综述[J]. 通信学报, 2019, 40(2): 154–163. doi: 10.11959/j.issn.1000-436x.2019035

    HE Xinfeng, TIAN Junfeng, and LIU Fanming. Survey on trusted cloud platform technology[J]. Journal on Communications, 2019, 40(2): 154–163. doi: 10.11959/j.issn.1000-436x.2019035
    [7]
    WANG Tian, LUO Hao, ZHENG Xi, et al. Crowdsourcing mechanism for trust evaluation in CPCS based on intelligent mobile edge computing[J]. ACM Transactions on Intelligent Systems and Technology, 2019, 10(6): 62. doi: 10.1145/3324926
    [8]
    乐光学, 戴亚盛, 杨晓慧, 等. 边缘计算可信协同服务策略建模[J]. 计算机研究与发展, 2020, 57(5): 1080–1102.

    YUE Guangxue, DAI Yasheng, YANG Xiaohui, et al. Model of trusted cooperative service for edge computing[J]. Journal of Computer Research and Development, 2020, 57(5): 1080–1102.
    [9]
    MISHRA D, DHARMINDER D, YADAV P, et al. A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party[J]. Journal of Information Security and Applications, 2020, 55: 102648. doi: 10.1016/j.jisa.2020.102648
    [10]
    KANG Baoyuan, HAN Yanbao, QIAN Kun, et al. Analysis and improvement on an authentication protocol for IoT-enabled devices in distributed cloud computing environment[J]. Mathematical Problems in Engineering, 2020, 2020: 1970798. doi: 10.1155/2020/1970798
    [11]
    HUANG Huihui, LU Siqi, WU Zehui, et al. An Efficient Authentication and Key Agreement Protocol for IoT-enabled Devices in Distributed Cloud Computing Architecture[J]. EURASIP Journal on Wireless Communications and Networking, 2021, 2021: 150. doi: 10.1186/s13638-021-02022-1
    [12]
    PSARAS I. Decentralised edge-computing and IoT through distributed trust[C]. The 16th Annual International Conference on Mobile Systems, Applications, and Services, Munich, Germany, 2018: 505–507.
    [13]
    CUI Laizhong, YANG Shu, CHEN Ziteng, et al. A decentralized and trusted edge computing platform for internet of things[J]. IEEE Internet of Things Journal, 2020, 7(5): 3910–3922. doi: 10.1109/JIOT.2019.2951619
    [14]
    GUO Shaoyong, DAI Yao, GUO Song, et al. Blockchain meets edge computing: Stackelberg game and double auction based task offloading for mobile blockchain[J]. IEEE Transactions on Vehicular Technology, 2020, 69(5): 5549–5561. doi: 10.1109/TVT.2020.2982000
    [15]
    宁振宇, 张锋巍, 施巍松. 基于边缘计算的可信执行环境研究[J]. 计算机研究与发展, 2019, 56(7): 1441–1453. doi: 10.7544/issn1000-1239.2019.20180522

    NING Zhenyu, ZHANG Fengwei, and SHI Weisong. A study of using TEE on edge computing[J]. Journal of Computer Research and Development, 2019, 56(7): 1441–1453. doi: 10.7544/issn1000-1239.2019.20180522
    [16]
    王冠, 袁华浩. 基于可信根服务器的虚拟TCM密钥管理功能研究[J]. 信息网络安全, 2016(4): 17–22.

    WANG Guan and YUAN Huahao. Research of virtual trusted cryptography module's secret key management based on the trusted root server[J]. Netinfo Security, 2016(4): 17–22.
    [17]
    ARMANDO A, BASIN D, BOICHUT Y, et al. The AVISPA tool for the automated validation of internet security protocols and applications[C]. The 17th International Conference on Computer Aided Verification, Edinburgh, UK, 2005: 281–285.
    [18]
    VIGANÒ L. Automated security protocol analysis with the AVISPA tool[J]. Electronic Notes in Theoretical Computer Science, 2006, 155: 61–86. doi: 10.1016/j.entcs.2005.11.052
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(7)  / Tables(6)

    Article Metrics

    Article views (867) PDF downloads(177) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return