首页> 中文学位 >边缘计算范例中基于区块链的隐私保护
【6h】

边缘计算范例中基于区块链的隐私保护

代理获取

目录

声明

NOMENCLATURE

1.1 Units

1.2 Symbols

ABBREVIATIONS

CHAPTER 1:INTRODUCTION

1.1 Motivation

1.2Problem Statement

1.3Aims and Objectives

1.4 Contributions

1.5Research Methodology

1.6Scope of Study

1.7Research Significance

1.8Thesis Outline

CHAPTER 2:LITERATURE REVIEW

2.1Definition of Edge Computing

2.2Edge Computing Architecture

2.3Edge Computing Paradigms

2.4Security Mechanisms in Edge Computing Paradigms

2.5Limitation of Public Key Cryptosystems

2.6Edge Computing Cryptosystems

2.6.1Limitation of current trends of Edge Computing Cryptosystems

2.6.2Blockchain Technology

2.6.3How Blockchain works

2.7Blockchain–Edge Paradigm Computing Integration

2.7.1Potential application of blockchain-based edge computing platforms

2.8Blockchain-based Cryptosystems.

2.9 Summary

CHAPTER 3:ROBUST ANDCOMPREHENSIVE USER AUTHENTICATION SCHEME FOR A DISTRIBUTED MOBILE CLOUD COMPUTING (MCC) ENVIRONMENT

3.1 Overview

3.2Proposed Scheme

3.3System Setup

3.3.1Cloud Server Registration

3.3.2User Registration Phase

3.3.3Loginand Authentication Phase

3.3.4Access Revocation

3.4Biometric and Password Update

3.5Cryptanalysis of Proposed Scheme

3.5.1EfficientAuthentication Phase

3.5.2Offline Identity and Password Guessing Attack

3.5.3Efficient AccessRevocation

3.5.4Service Provider Attack

3.5.5User Anonymity and Untraceability

3.6Further Security Analysis using AVISPA

3.6.1Simulation Results Analysis

3.7Further Simulations Using Network Simulator 2 (NS2)

3.7.1Analysis of The Impact on Throughput

3.7.2Analysis of the Impact on Load

3.7.3Analysis of Energy Consumption

3.8Comparative andPerformance Analysis

3.8.1Functionality and Security Features Comparison

3.9 Summary

CHAPTER 4:DECCHAIN: A DECENTRALIZED SECURITY APPROACH IN EDGE COMPUTING BASED ON BLOCKCHAIN

4.1 Overview

4.2Challenges in Edge Paradigms

4.3AuthenticationConceptsof Edge Computing

4.4Challenges with Blockchain-Edge Paradigm Computing Integration

4.5DecChain (DC) Design Principles

4.5.1DecChain Architecture

4.5.2Node Registration, Login, and Authentication

4.5.3Exchange of Information between Nodes and Service Providers

4.6Cryptanalysis of DecChainScheme

4.6.1Privacy of User Credentials and Impersonation Attack

4.6.2User Untraceability and Anonymity

4.6.3Service Provider Impersonation

4.6.4Replay and man-in-the-middle attacks

4.7Further Cryptanalysis using AVISPA

4.8Practical simulation using NS2 simulator

4.8.1Impact Analysis on Load

4.8.2Impact Analysis ofThroughput

4.8.3Impact Analysis of Energy Consumption

4.9Performance Analysis

CHAPTER 5:PRIVACY ENHANCEMENT SCHEME(PES) IN A BLOCKCHAIN-EDGE COMPUTING ENVIRONMENT

5.1 Overview

5.2Limitation of Current Trends in Blockchain-Edge Computing Environment

5.3Proposed Scheme

5.3.1 Authentication in PES

5.3.1 Assumptions

5.3.2Description ofPES

5.3.3Public Key Random Generation (PKRG)

5.3.4Digital Signature Generation (DSG)

5.4Cryptanalysis of Privacy Enhancement Scheme

5.4.1Threat Model

5.4.2User Anonymity and Untraceability

5.4.3Integrity of Transaction

5.4.4Mutual Authentication

5.4.5User Impersonation Attacks

5.4.6Insider Attacks

5.5Security Analysis Using AVISPA SPAN

5.6Discussion of Simulation Results

5.7Practical Simulation and Discussion of Simulation Results

5.7.1Load Analysis

5.7.2Throughput Analysis

5.7.3Energy Consumption Analysis

5.8 Performance Analysis

5.9 Summary

CHAPTER 6:BLOCKCHAIN IMPLEMENTATION

6.1 Introduction

6.2Blockchain Transaction Flow

6.3HyperLedger Fabric

6.4Transaction Creation andExchange

6.5Blocks Compilation

6.6Block Mining

CHAPTER 7:CONCLUSION AND RECOMMENDATION

7.1 Conclusion

7.2 Recommendations

参考文献

致谢

PUBLICATIONS AND RESEARCH ACHIEVEMENTS

Appendix A:IMPLEMENTATION AND SIMULATION OF PROVABLY MORE ROBUST AUTHENTICATION SCHEME USING AVISPA

APPENDIX B:INTEGRATION OF FUZZY EXTRACTOR BIO-CRYPTOSYSTEM INTO DECCHAIN

APPENDIX C:IMPLEMENTATION AND SIMULATION OF DECCHAIN SCHEME USING AVISPA

APPENDIX D:IMPLEMENTATION AND SIMULATION OF PES USING AVISPA

APPENDIXE: BLOCKCHAIN IMPLEMENTATION ALGORITHM

展开▼

著录项

  • 作者

    Ernest Bonnah;

  • 作者单位

    江苏大学;

  • 授予单位 江苏大学;
  • 学科 Computer Application Technology
  • 授予学位 博士
  • 导师姓名 Ju Shiguang;
  • 年度 2020
  • 页码
  • 总页数
  • 原文格式 PDF
  • 正文语种 chi
  • 中图分类 B08TP3;
  • 关键词

相似文献

  • 中文文献
  • 外文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号