A secure cross-domain authentication scheme based on threshold signature for MEC

Abstract The widespread adoption of fifth-generation mobile networks has spurred the rapid advancement of mobile edge computing (MEC). By decentralizing computing and storage resources to the network edge, MEC significantly enhances real-time data access services and enables efficient processing of...

Full description

Bibliographic Details
Main Authors: Lei Chen, Chong Guo, Bei Gong, Muhammad Waqas, Lihua Deng, Haowen Qin
Format: Article
Language:English
Published: SpringerOpen 2024-03-01
Series:Journal of Cloud Computing: Advances, Systems and Applications
Subjects:
Online Access:https://doi.org/10.1186/s13677-024-00631-x
_version_ 1797247002152534016
author Lei Chen
Chong Guo
Bei Gong
Muhammad Waqas
Lihua Deng
Haowen Qin
author_facet Lei Chen
Chong Guo
Bei Gong
Muhammad Waqas
Lihua Deng
Haowen Qin
author_sort Lei Chen
collection DOAJ
description Abstract The widespread adoption of fifth-generation mobile networks has spurred the rapid advancement of mobile edge computing (MEC). By decentralizing computing and storage resources to the network edge, MEC significantly enhances real-time data access services and enables efficient processing of large-scale dynamic data on resource-limited devices. However, MEC faces considerable security challenges, particularly in cross-domain service environments, where every device poses a potential security threat. To address this issue, this paper proposes a secure cross-domain authentication scheme based on a threshold signature tailored to MEC’s multi-subdomain nature. The proposed scheme employs a (t,n) threshold mechanism to bolster system resilience and security, catering to large-scale, dynamic, and decentralized MEC scenarios. Additionally, the proposed scheme features an efficient authorization update function that facilitates the revocation of malicious nodes. Security analysis confirmed that the proposed scheme satisfies unforgeability, collusion resistance, non-repudiation and forward security. Theoretical evaluation and experimental simulation verify the effectiveness and feasibility of the proposed scheme. Compared with existing schemes, the proposed scheme has higher computational performance while implementing secure authorization updates.
first_indexed 2024-04-24T19:51:46Z
format Article
id doaj.art-78c0f00c0254428e85431a0e90b1b746
institution Directory Open Access Journal
issn 2192-113X
language English
last_indexed 2024-04-24T19:51:46Z
publishDate 2024-03-01
publisher SpringerOpen
record_format Article
series Journal of Cloud Computing: Advances, Systems and Applications
spelling doaj.art-78c0f00c0254428e85431a0e90b1b7462024-03-24T12:33:59ZengSpringerOpenJournal of Cloud Computing: Advances, Systems and Applications2192-113X2024-03-0113111210.1186/s13677-024-00631-xA secure cross-domain authentication scheme based on threshold signature for MECLei Chen0Chong Guo1Bei Gong2Muhammad Waqas3Lihua Deng4Haowen Qin5College of Compute, National University of Defense TechnologyFaculty of Information Technology, Beijing University of TechnologyFaculty of Information Technology, Beijing University of TechnologyFaculty of Engineering and Science, School of Computing and Mathematical Sciences, University of GreenwichChina Telecom Research InstituteFaculty of Information Technology, Beijing University of TechnologyAbstract The widespread adoption of fifth-generation mobile networks has spurred the rapid advancement of mobile edge computing (MEC). By decentralizing computing and storage resources to the network edge, MEC significantly enhances real-time data access services and enables efficient processing of large-scale dynamic data on resource-limited devices. However, MEC faces considerable security challenges, particularly in cross-domain service environments, where every device poses a potential security threat. To address this issue, this paper proposes a secure cross-domain authentication scheme based on a threshold signature tailored to MEC’s multi-subdomain nature. The proposed scheme employs a (t,n) threshold mechanism to bolster system resilience and security, catering to large-scale, dynamic, and decentralized MEC scenarios. Additionally, the proposed scheme features an efficient authorization update function that facilitates the revocation of malicious nodes. Security analysis confirmed that the proposed scheme satisfies unforgeability, collusion resistance, non-repudiation and forward security. Theoretical evaluation and experimental simulation verify the effectiveness and feasibility of the proposed scheme. Compared with existing schemes, the proposed scheme has higher computational performance while implementing secure authorization updates.https://doi.org/10.1186/s13677-024-00631-xAuthenticationThreshold signatureAuthorization updateMobile edge computing
spellingShingle Lei Chen
Chong Guo
Bei Gong
Muhammad Waqas
Lihua Deng
Haowen Qin
A secure cross-domain authentication scheme based on threshold signature for MEC
Journal of Cloud Computing: Advances, Systems and Applications
Authentication
Threshold signature
Authorization update
Mobile edge computing
title A secure cross-domain authentication scheme based on threshold signature for MEC
title_full A secure cross-domain authentication scheme based on threshold signature for MEC
title_fullStr A secure cross-domain authentication scheme based on threshold signature for MEC
title_full_unstemmed A secure cross-domain authentication scheme based on threshold signature for MEC
title_short A secure cross-domain authentication scheme based on threshold signature for MEC
title_sort secure cross domain authentication scheme based on threshold signature for mec
topic Authentication
Threshold signature
Authorization update
Mobile edge computing
url https://doi.org/10.1186/s13677-024-00631-x
work_keys_str_mv AT leichen asecurecrossdomainauthenticationschemebasedonthresholdsignatureformec
AT chongguo asecurecrossdomainauthenticationschemebasedonthresholdsignatureformec
AT beigong asecurecrossdomainauthenticationschemebasedonthresholdsignatureformec
AT muhammadwaqas asecurecrossdomainauthenticationschemebasedonthresholdsignatureformec
AT lihuadeng asecurecrossdomainauthenticationschemebasedonthresholdsignatureformec
AT haowenqin asecurecrossdomainauthenticationschemebasedonthresholdsignatureformec
AT leichen securecrossdomainauthenticationschemebasedonthresholdsignatureformec
AT chongguo securecrossdomainauthenticationschemebasedonthresholdsignatureformec
AT beigong securecrossdomainauthenticationschemebasedonthresholdsignatureformec
AT muhammadwaqas securecrossdomainauthenticationschemebasedonthresholdsignatureformec
AT lihuadeng securecrossdomainauthenticationschemebasedonthresholdsignatureformec
AT haowenqin securecrossdomainauthenticationschemebasedonthresholdsignatureformec