首页 | 官方网站   微博 | 高级检索  
     

基于雾计算的工业互联网安全数据访问方法
引用本文:李静元,张珂,杨东裕.基于雾计算的工业互联网安全数据访问方法[J].计算机与现代化,2022,0(12):118-122.
作者姓名:李静元  张珂  杨东裕
基金项目:西安市“人工智能”产业创新链推进工程项目(20RGZN0025); 国家重点研发计划项目(2018YFB1802403)
摘    要:针对工业互联网应用场景中的低时延、低功耗和安全性要求,提出一种雾计算架构的工业互联网数据安全访问方法,基于属性集生成对应的非对称密钥对进行加密消息并存储在云端服务器,由雾节点层来完成密文的部分加解密任务,消除对云服务层的信任依赖和降低设备层的计算开销负担。雾节点层和云服务层对密文数据来说是半信任状态,它们无法根据密文获取任何原始消息,只有授权的设备使用私钥才能完成完全解密获取原始消息,实现工业互联网中端到端的高效安全数据访问方式。通过性能分析验证,提出的方法相比其他方案计算开销和响应延迟更低,安全隐私性更可靠。

关 键 词:industrial  Internet    fog  calculation    access  control    privacy  protection       attribute-based  encryption  
收稿时间:2023-01-04

Secure Data Access Method of Industrial Internet Based on Fog Computing
Abstract:Aiming at the requirements of low delay, low power consumption and security in the industrial Internet application scenario, a secure access method of industrial Internet data based on fog computing architecture is proposed. The corresponding asymmetric key pair is generated based on the attribute set to encrypt the message and stored in the cloud server. Part of the encryption and decryption tasks of the ciphertext are completed by the fog node layer, which eliminates trust dependency in the cloud service layer and reduces the computing overhead burden of the device layer. The fog node layer and cloud service layer are semi trusted to the ciphertext data. They cannot obtain any original message according to the ciphertext. Only the authorized device can complete the complete decryption and obtain the original message by using the private key, so as to realize the end-to-end efficient and secure data access in the industrial Internet. The performance analysis shows that the proposed method has lower computational overhead and response delay and more reliable security and privacy than other schemes.
Keywords:
点击此处可从《计算机与现代化》浏览原始摘要信息
点击此处可从《计算机与现代化》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号