声明
NOMENCLATURE
1.1 Units
1.2 Symbols
ABBREVIATIONS
CHAPTER 1:INTRODUCTION
1.1 Motivation
1.2Problem Statement
1.3Aims and Objectives
1.4 Contributions
1.5Research Methodology
1.6Scope of Study
1.7Research Significance
1.8Thesis Outline
CHAPTER 2:LITERATURE REVIEW
2.1Definition of Edge Computing
2.2Edge Computing Architecture
2.3Edge Computing Paradigms
2.4Security Mechanisms in Edge Computing Paradigms
2.5Limitation of Public Key Cryptosystems
2.6Edge Computing Cryptosystems
2.6.1Limitation of current trends of Edge Computing Cryptosystems
2.6.2Blockchain Technology
2.6.3How Blockchain works
2.7Blockchain–Edge Paradigm Computing Integration
2.7.1Potential application of blockchain-based edge computing platforms
2.8Blockchain-based Cryptosystems.
2.9 Summary
CHAPTER 3:ROBUST ANDCOMPREHENSIVE USER AUTHENTICATION SCHEME FOR A DISTRIBUTED MOBILE CLOUD COMPUTING (MCC) ENVIRONMENT
3.1 Overview
3.2Proposed Scheme
3.3System Setup
3.3.1Cloud Server Registration
3.3.2User Registration Phase
3.3.3Loginand Authentication Phase
3.3.4Access Revocation
3.4Biometric and Password Update
3.5Cryptanalysis of Proposed Scheme
3.5.1EfficientAuthentication Phase
3.5.2Offline Identity and Password Guessing Attack
3.5.3Efficient AccessRevocation
3.5.4Service Provider Attack
3.5.5User Anonymity and Untraceability
3.6Further Security Analysis using AVISPA
3.6.1Simulation Results Analysis
3.7Further Simulations Using Network Simulator 2 (NS2)
3.7.1Analysis of The Impact on Throughput
3.7.2Analysis of the Impact on Load
3.7.3Analysis of Energy Consumption
3.8Comparative andPerformance Analysis
3.8.1Functionality and Security Features Comparison
3.9 Summary
CHAPTER 4:DECCHAIN: A DECENTRALIZED SECURITY APPROACH IN EDGE COMPUTING BASED ON BLOCKCHAIN
4.1 Overview
4.2Challenges in Edge Paradigms
4.3AuthenticationConceptsof Edge Computing
4.4Challenges with Blockchain-Edge Paradigm Computing Integration
4.5DecChain (DC) Design Principles
4.5.1DecChain Architecture
4.5.2Node Registration, Login, and Authentication
4.5.3Exchange of Information between Nodes and Service Providers
4.6Cryptanalysis of DecChainScheme
4.6.1Privacy of User Credentials and Impersonation Attack
4.6.2User Untraceability and Anonymity
4.6.3Service Provider Impersonation
4.6.4Replay and man-in-the-middle attacks
4.7Further Cryptanalysis using AVISPA
4.8Practical simulation using NS2 simulator
4.8.1Impact Analysis on Load
4.8.2Impact Analysis ofThroughput
4.8.3Impact Analysis of Energy Consumption
4.9Performance Analysis
CHAPTER 5:PRIVACY ENHANCEMENT SCHEME(PES) IN A BLOCKCHAIN-EDGE COMPUTING ENVIRONMENT
5.1 Overview
5.2Limitation of Current Trends in Blockchain-Edge Computing Environment
5.3Proposed Scheme
5.3.1 Authentication in PES
5.3.1 Assumptions
5.3.2Description ofPES
5.3.3Public Key Random Generation (PKRG)
5.3.4Digital Signature Generation (DSG)
5.4Cryptanalysis of Privacy Enhancement Scheme
5.4.1Threat Model
5.4.2User Anonymity and Untraceability
5.4.3Integrity of Transaction
5.4.4Mutual Authentication
5.4.5User Impersonation Attacks
5.4.6Insider Attacks
5.5Security Analysis Using AVISPA SPAN
5.6Discussion of Simulation Results
5.7Practical Simulation and Discussion of Simulation Results
5.7.1Load Analysis
5.7.2Throughput Analysis
5.7.3Energy Consumption Analysis
5.8 Performance Analysis
5.9 Summary
CHAPTER 6:BLOCKCHAIN IMPLEMENTATION
6.1 Introduction
6.2Blockchain Transaction Flow
6.3HyperLedger Fabric
6.4Transaction Creation andExchange
6.5Blocks Compilation
6.6Block Mining
CHAPTER 7:CONCLUSION AND RECOMMENDATION
7.1 Conclusion
7.2 Recommendations
参考文献
致谢
PUBLICATIONS AND RESEARCH ACHIEVEMENTS
Appendix A:IMPLEMENTATION AND SIMULATION OF PROVABLY MORE ROBUST AUTHENTICATION SCHEME USING AVISPA
APPENDIX B:INTEGRATION OF FUZZY EXTRACTOR BIO-CRYPTOSYSTEM INTO DECCHAIN
APPENDIX C:IMPLEMENTATION AND SIMULATION OF DECCHAIN SCHEME USING AVISPA
APPENDIX D:IMPLEMENTATION AND SIMULATION OF PES USING AVISPA
APPENDIXE: BLOCKCHAIN IMPLEMENTATION ALGORITHM
江苏大学;