当前位置: X-MOL 学术Arab. J. Sci. Eng. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
PCOS—Privacy-Controlled Offloading Scheme for Secure Service Data Offloading in Edge-Internet of Things-Cloud Scenario
Arabian Journal for Science and Engineering ( IF 2.9 ) Pub Date : 2021-04-13 , DOI: 10.1007/s13369-021-05607-6
Mohammed Saeed Alkatheiri

Mobile Edge Computing can provide application-centric Internet of Things (IoT) services at the brim of the user’s network. This reduces the latency and increases the availability of the services for the users. However, security measures are limited to the density of adversaries detected in the network’s edge. Impeding adversaries increase the threats for privacy and service sharing through eavesdropping or jamming. By considering the adversaries' threat in the network’s edge, this paper introduces privacy-controlled offloading scheme for improving the data sharing security between the edge-IoT devices. In this scheme, harmonized trust validation using recursive decision making is performed, followed by the data offloading process. The trusted non-virtual edge devices are identified based on the previous successful sharing instances. Post to detect non-virtual trusted edge devices, and the offloading is performed in privacy preserved sessions exploiting volatile shared key authentication. Verifying the edge devices' trust by differentiating the virtual and real is facilitated using deep belief networks. The proposed scheme is reliable in preventing service loss (5.26%), reducing false alarm (0.2%), and improving the network's availability of trusted devices (96.2%).



中文翻译:

PCOS-隐私控制的卸载方案,用于边缘互联网,物联网和云方案中的安全服务数据卸载

移动边缘计算可以在用户网络边缘提供以应用程序为中心的物联网(IoT)服务。这减少了等待时间,并为用户增加了服务的可用性。但是,安全措施仅限于在网络边缘检测到的敌人的密度。阻碍对手通过窃听或干扰增加了隐私和服务共享的威胁。通过考虑对手在网络边缘的威胁,本文介绍了隐私控制的卸载方案,以提高边缘物联网设备之间的数据共享安全性。在此方案中,执行使用递归决策制定的统一信任验证,然后执行数据卸载过程。基于先前的成功共享实例来标识受信任的非虚拟边缘设备。发布以检测非虚拟的受信任边缘设备,并通过使用易失性共享密钥身份验证在隐私保留的会话中执行卸载。使用深度置信网络有助于通过区分虚拟设备和真实设备来验证边缘设备的信任。所提出的方案在防止服务丢失(5.26%),减少误报(0.2%)以及提高网络可信任设备的可用性(96.2%)方面是可靠的。

更新日期:2021-04-13
down
wechat
bug