Turn off MathJax
Article Contents
SUN Haipeng, TAN Yu-an, LI Congwu, LEI Lei, ZHANG Qikun, HU Jingjing. An Edge-Cloud Collaborative Cross-Domain Identity-Based Authentication Protocol with Privacy Protection[J]. Chinese Journal of Electronics. doi: 10.1049/cje.2021.00.269
Citation: SUN Haipeng, TAN Yu-an, LI Congwu, LEI Lei, ZHANG Qikun, HU Jingjing. An Edge-Cloud Collaborative Cross-Domain Identity-Based Authentication Protocol with Privacy Protection[J]. Chinese Journal of Electronics. doi: 10.1049/cje.2021.00.269

An Edge-Cloud Collaborative Cross-Domain Identity-Based Authentication Protocol with Privacy Protection

doi: 10.1049/cje.2021.00.269
Funds:  This work was supported by the National Key Research and Development Program of China( Grant No.2020YFB1712101), The National Natural Science Foundation of China under Grant (No.61772070, 61772477 and 61971380 ), The Key Technologies R and D Program of Henan Province (No.212102210089, 212102210171, 212102210075), and The Collaborative Innovation Special Plan Project of Zhengzhou (Grant No.2021ZDPY0206).
More Information
  • Author Bio:

    received his M.S. degree in Beijing University of Posts and Telecommunications in 2009. Now he is a Ph.D. candidate in School of Computer Science and Technology, Beijing Institute of Technology. His main research interest include wireless communications, blockchain, access control,and cloud storage.(Email: sunhaipeng@bit.edu.cn)

    (corresponding author) received the PhD degree in computer science from Beijing Institute of Technology, Beijing, China. She is currently an associate professor in the School of Computer at Beijing Institute of Technology. Her research interests are in the areas of service computing, web intelligence, and information security. (Email: hujingjing@bit.edu.cn)

  • Received Date: 2021-08-01
  • Accepted Date: 2021-09-28
  • Available Online: 2021-11-03
  • Edge-cloud collaborative computing has a wide range of application scenarios. Resource sharing is one of the key technologies to realize various application scenarios. Identity authentication is an important means to ensure the security of resource sharing in various application scenarios. Because the edge-cloud collaborative application scenario is more complex, it involves collaborative operations among different security domains, frequently access and exit application system of mobile terminals. Traditional identity authentication is no longer suitable for complex application scenarios of edgecloud collaborative computing. Therefore, a cross-domain identity authentication protocol based on privacy protection is proposed. The main advantages of the protocol are as follows. 1) Self-certified key generation algorithm: the public/private key pair of the mobile terminal is generated by the terminal members themselves. The identity registration is realized through the correspondence between the self-authenticating public key and the identity to protect the privacy of the individual. It avoids security risks caused by third-party key distribution and key escrow; 2) Crossdomain identity authentication: the alliance keys are calculated among edge servers through blockchain technology. Each edge server uses the alliance keys to sign the identity information of terminals in its domain. Cross-domain identity authentication is realized through the signature authentication of the alliance domain. The cross-domain authentication process is simple and efficient; 3) Revocability of identity authentication: When the mobile terminal has logged off or exited the system, the legal identity of the terminal in the system will also become invalid immediately, so as to ensure the forward and backward security of accessing system resources. Under the hardness assumption of discrete logarithm problem (DLP) and computational Diffie-Hellman(CDH) problem, the security of the protocol is proven, and the efficiency of the protocol is verified.
  • loading
  • [1]
    Y.Y. Lv, W.J. Liu and Z. Wang, “Heterogeneous cross-Domain identity authentication scheme based on proxy resignature in cloud environment,” Mathematical Problems in Engineering, vol.2020, 2020. doi: 10.1155/2020/2078032
    [2]
    H.J. Wang and J. Jiang, “A novel blockchain identity authentication scheme implemented in fog computing,” Wireless Communications and Mobile Computing, vol.2020, 2020. doi: 10.1155/2020/8849363
    [3]
    X.Y. Xiang, M.Y. Wang and W.G. Fan, “A permissioned blockchain-based identity management and user authentication scheme for e-Health systems,” IEEE Access, vol.8, pp.171771–171783, 2020. doi: 10.1109/ACCESS.2020.3022429
    [4]
    X.D. Jia, N. Hu, S. Su, et al., “IRBA: an identity-based cross-domain authentication scheme for the internet of things,” Electronics, vol.9, no.4, article no.e634, 2020. doi: 10.3390/electronics9040634
    [5]
    Y.Y. Ye and X.L. Zhang, “Research on anonymous identity authentication technology in fabric,” Chinese Journal of Network and Information Security, vol.7, no.3, pp.134–140, 2021.
    [6]
    M.A. Al-shareeda, M.Anbar, S.Manickam, et al., “An efficient identity-based conditional privacy-preserving authentication scheme for secure communication in a vehicular ad hoc network,” Symmetry-Basel, vol.12, no.10, article no.1687, 2020. doi: 10.3390/sym12101687
    [7]
    Y.T. Li, Q.F. Cheng, X.M. Liu, et al., “A secure Aanonymous identity-based scheme in new authentication architecture for mobile edge computing,” IEEE Systems Journal, vol.15, no.1, pp.935–946, 2020.
    [8]
    J.C. Huang, M.H. Shu, B.M. Hsu, et al., “Service architecture of IoT terminal connection based on blockchain identity authentication system,” Computer Communications, vol.160, pp.411–422, 2020. doi: 10.1016/j.comcom.2020.06.027
    [9]
    J. Xu, K.P. Xue, H.Y. Tian, et al., “An identity management and authentication scheme based on redactable blockchain for mobile networks,” IEEE Transactions on Vehicular Technology, vol.69, no.6, pp.6688–6698, 2020. doi: 10.1109/TVT.2020.2986041
    [10]
    L.J. Song, G. Sun, H.F. Yu, et al., “Fbia: a fog-based identity authentication scheme for privacy preservation in internet of vehicles,” IEEE Transactions on Vehicular Technology, vol.69, no.5, pp.5403–5415, 2020. doi: 10.1109/TVT.2020.2977829
    [11]
    Q. Liu, B. Gong and Z.H. Ning, “Research on CLPKC-IDPKC cross-domain identity authentication for IoT environment,” Computer Communications, vol.157, pp.410–416, 2020. doi: 10.1016/j.comcom.2020.04.043
    [12]
    Z.H. Cui, F. Xue, S.Q. Zhang, et al., “A hybrid BlockChain-based identity authentication scheme for multi-WSN,” IEEE Transactions on Services Computing, vol.13, no.2, pp.241–251, 2020.
    [13]
    X.Y. Jia, D.B. He, N. Kumar, et al., “A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing,” IEEE Systems Journal, vol.14, no.1, pp.560–571, 2019.
    [14]
    M. Han, Z.K. Yin, P.Z. Cheng, et al., “Zero-knowledge identity authentication for internet of vehicles: Improvement and application,” PloS One, vol.15, no.9, article no.e0239043, 2020. doi: 10.1371/journal.pone.0239043
    [15]
    X.X. Qi, M.H. Li and Y. Du, “Lightweight identity authentication protocol based on dynamic ID in multi-server environment,” Journal of Beijing University of Aeronautics and Astronautics, pp.1–12, 2021.
    [16]
    J. Li and H.X. Chai, “IoT authentication solution based on FIDO technology,” Journal of Information Security Research, vol.7, no.4, pp.358–366, 2021.
    [17]
    Y.Z. Tu, J. Gan, Y. Hu, et al., “Decentralized identity authentication and key management scheme based on blockchain,” Cyberspace Security, vol.10, no.6, pp.33–39, 2019.
    [18]
    Y.M. Hei, J.W. Liu and Y.W. Guan, “A blockchain-based authentication scheme for identity information sharing,” Journal of Cryptologic Research, vol.7, no.5, pp.605–615, 2020.
    [19]
    Q. Zhang, L. Zhu, R. Wang, et al., “Group key agreement protocol among terminals of the intelligent information system for mobile edge computing,” International Journal of Intelligent Systems, 2021. doi: 10.1002/int.22544
    [20]
    P. Tao and S.J. Deng, “Continuous authentication based on adaptive deep feature fusion,” Journal of Chongqing University, pp.1–12, 2021.
    [21]
    Y.N. Liu, S.Z. Lv, M. Xie, et al., “Dynamic anonymous identity authentication (DAIA) scheme for VANET,” International Journal of Communication Systems, vol.32, no.5, article no.e3892, 2019. doi: 10.1002/dac.3892
    [22]
    J. Long and X. SU, “Anonymous chaotic-based identity authentication protocol in IoT,” International Journal of Embedded Systems, vol.14, no.2, pp.194–200, 2021. doi: 10.1504/IJES.2021.113813
    [23]
    Q. Zhang, L. Zhu, Y. Li, et al., “A group key agreement protocol for intelligent internet of things system,” International Journal of Intelligent Systems, 2021. doi: 10.1002/int.22644
    [24]
    L.B. Wu, J. Wang, K.K.R. Choo, et al., “An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network,” Journal of Information Security and Applications, vol.37, pp.112–121, 2017. doi: 10.1016/j.jisa.2017.10.003
    [25]
    D.L. Liu, D. Li, X. Liu, et al., “Research on a cross-domain authentication scheme based on consortium blockchain in V2G networks of smart grid,” 2018 2nd IEEE Conference on Energy Internet and Energy System Integration (EI2). IEEE, pp.1–5, 2018.
    [26]
    Q.K. Zhang, Y. Gan, R.F. Wang, et al., “Inter-cluster asymmetric group key agreement,” Journal of Computer Research and Development, vol.55, no.12, article no.2651, 2018.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(5)  / Tables(2)

    Article Metrics

    Article views (319) PDF downloads(45) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return