A secure cross-domain authentication scheme based on threshold signature for MEC
Abstract The widespread adoption of fifth-generation mobile networks has spurred the rapid advancement of mobile edge computing (MEC). By decentralizing computing and storage resources to the network edge, MEC significantly enhances real-time data access services and enables efficient processing of...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2024-03-01
|
Series: | Journal of Cloud Computing: Advances, Systems and Applications |
Subjects: | |
Online Access: | https://doi.org/10.1186/s13677-024-00631-x |
_version_ | 1797247002152534016 |
---|---|
author | Lei Chen Chong Guo Bei Gong Muhammad Waqas Lihua Deng Haowen Qin |
author_facet | Lei Chen Chong Guo Bei Gong Muhammad Waqas Lihua Deng Haowen Qin |
author_sort | Lei Chen |
collection | DOAJ |
description | Abstract The widespread adoption of fifth-generation mobile networks has spurred the rapid advancement of mobile edge computing (MEC). By decentralizing computing and storage resources to the network edge, MEC significantly enhances real-time data access services and enables efficient processing of large-scale dynamic data on resource-limited devices. However, MEC faces considerable security challenges, particularly in cross-domain service environments, where every device poses a potential security threat. To address this issue, this paper proposes a secure cross-domain authentication scheme based on a threshold signature tailored to MEC’s multi-subdomain nature. The proposed scheme employs a (t,n) threshold mechanism to bolster system resilience and security, catering to large-scale, dynamic, and decentralized MEC scenarios. Additionally, the proposed scheme features an efficient authorization update function that facilitates the revocation of malicious nodes. Security analysis confirmed that the proposed scheme satisfies unforgeability, collusion resistance, non-repudiation and forward security. Theoretical evaluation and experimental simulation verify the effectiveness and feasibility of the proposed scheme. Compared with existing schemes, the proposed scheme has higher computational performance while implementing secure authorization updates. |
first_indexed | 2024-04-24T19:51:46Z |
format | Article |
id | doaj.art-78c0f00c0254428e85431a0e90b1b746 |
institution | Directory Open Access Journal |
issn | 2192-113X |
language | English |
last_indexed | 2024-04-24T19:51:46Z |
publishDate | 2024-03-01 |
publisher | SpringerOpen |
record_format | Article |
series | Journal of Cloud Computing: Advances, Systems and Applications |
spelling | doaj.art-78c0f00c0254428e85431a0e90b1b7462024-03-24T12:33:59ZengSpringerOpenJournal of Cloud Computing: Advances, Systems and Applications2192-113X2024-03-0113111210.1186/s13677-024-00631-xA secure cross-domain authentication scheme based on threshold signature for MECLei Chen0Chong Guo1Bei Gong2Muhammad Waqas3Lihua Deng4Haowen Qin5College of Compute, National University of Defense TechnologyFaculty of Information Technology, Beijing University of TechnologyFaculty of Information Technology, Beijing University of TechnologyFaculty of Engineering and Science, School of Computing and Mathematical Sciences, University of GreenwichChina Telecom Research InstituteFaculty of Information Technology, Beijing University of TechnologyAbstract The widespread adoption of fifth-generation mobile networks has spurred the rapid advancement of mobile edge computing (MEC). By decentralizing computing and storage resources to the network edge, MEC significantly enhances real-time data access services and enables efficient processing of large-scale dynamic data on resource-limited devices. However, MEC faces considerable security challenges, particularly in cross-domain service environments, where every device poses a potential security threat. To address this issue, this paper proposes a secure cross-domain authentication scheme based on a threshold signature tailored to MEC’s multi-subdomain nature. The proposed scheme employs a (t,n) threshold mechanism to bolster system resilience and security, catering to large-scale, dynamic, and decentralized MEC scenarios. Additionally, the proposed scheme features an efficient authorization update function that facilitates the revocation of malicious nodes. Security analysis confirmed that the proposed scheme satisfies unforgeability, collusion resistance, non-repudiation and forward security. Theoretical evaluation and experimental simulation verify the effectiveness and feasibility of the proposed scheme. Compared with existing schemes, the proposed scheme has higher computational performance while implementing secure authorization updates.https://doi.org/10.1186/s13677-024-00631-xAuthenticationThreshold signatureAuthorization updateMobile edge computing |
spellingShingle | Lei Chen Chong Guo Bei Gong Muhammad Waqas Lihua Deng Haowen Qin A secure cross-domain authentication scheme based on threshold signature for MEC Journal of Cloud Computing: Advances, Systems and Applications Authentication Threshold signature Authorization update Mobile edge computing |
title | A secure cross-domain authentication scheme based on threshold signature for MEC |
title_full | A secure cross-domain authentication scheme based on threshold signature for MEC |
title_fullStr | A secure cross-domain authentication scheme based on threshold signature for MEC |
title_full_unstemmed | A secure cross-domain authentication scheme based on threshold signature for MEC |
title_short | A secure cross-domain authentication scheme based on threshold signature for MEC |
title_sort | secure cross domain authentication scheme based on threshold signature for mec |
topic | Authentication Threshold signature Authorization update Mobile edge computing |
url | https://doi.org/10.1186/s13677-024-00631-x |
work_keys_str_mv | AT leichen asecurecrossdomainauthenticationschemebasedonthresholdsignatureformec AT chongguo asecurecrossdomainauthenticationschemebasedonthresholdsignatureformec AT beigong asecurecrossdomainauthenticationschemebasedonthresholdsignatureformec AT muhammadwaqas asecurecrossdomainauthenticationschemebasedonthresholdsignatureformec AT lihuadeng asecurecrossdomainauthenticationschemebasedonthresholdsignatureformec AT haowenqin asecurecrossdomainauthenticationschemebasedonthresholdsignatureformec AT leichen securecrossdomainauthenticationschemebasedonthresholdsignatureformec AT chongguo securecrossdomainauthenticationschemebasedonthresholdsignatureformec AT beigong securecrossdomainauthenticationschemebasedonthresholdsignatureformec AT muhammadwaqas securecrossdomainauthenticationschemebasedonthresholdsignatureformec AT lihuadeng securecrossdomainauthenticationschemebasedonthresholdsignatureformec AT haowenqin securecrossdomainauthenticationschemebasedonthresholdsignatureformec |