咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Novel Private Data Access Cont... 收藏

Novel Private Data Access Control Scheme Suitable for Mobile Edge Computing

Novel Private Data Access Control Scheme Suitable for Mobile Edge Computing

作     者:Wei Liang Songyou Xie Jiahong Cai Chong Wang Yujie Hong Xiaoyan Kui Wei Liang;Songyou Xie;Jiahong Cai;Chong Wang;Yujie Hong;Xiaoyan Kui

作者机构:College of Computer Science and Electronic EngineeringHunan UniversityChangsha 410082China School of Computer Science and EngineeringHunan University of Science and TechnologyXiangtan 411201China School of Computer Science and EngineeringCentral South UniversityChangsha 410083China 

出 版 物:《China Communications》 (中国通信(英文版))

年 卷 期:2021年第18卷第11期

页      面:92-103页

核心收录:

学科分类:0839[工学-网络空间安全] 08[工学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:partially supported by the National Natural Science Foundation of China under Grant 62072170 and Grant 62177047 the Fundamental Research Funds for the Central Universities under Grant 531118010527 the Science and Technology Key Projects of Hunan Province under Grant 2022GK2015 the Hunan Provincial Natural Science Foundation of China under Grant 2021JJ30141 

主  题:mobile edge computing(MEC) privacy protection access control anonymous authentication 

摘      要:Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data *** work proposes an anonymous privacy data protection and access control scheme based on elliptic curve cryptography(ECC)and bilinear pairing to protect the communication security of the *** the proposed scheme,the information sender encrypts private information through the ECC algorithm,and the information receiver uses its own key information and bilinear pairing to extract and verify the identity of the information *** each round of communication,the proposed scheme uses timestamps and random numbers to ensure the freshness of each round of *** results show that the proposed scheme has good security performance and can provide data privacy protection,integrity verification,and traceability for the communication process of *** proposed scheme has a lower cost than other related *** communication and computational cost of the proposed scheme are reduced by 31.08% and 22.31% on average compared with those of the other related schemes.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分