Secure and scalable cross-domain data sharing in zero-trust cloud-edge-end environment based on sharding blockchain

Y Liu, X Xing, Z Tong, X Lin, J Chen… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Y Liu, X Xing, Z Tong, X Lin, J Chen, Z Guan, Q Wu, W Susilo
IEEE Transactions on Dependable and Secure Computing, 2023ieeexplore.ieee.org
The cloud-edge-end architecture is suitable for many essential scenarios, such as 5 G, the
Internet of Things (IoT), and mobile edge computing. Under this architecture, cross-domain
and cross-layer data sharing is commonly in need. Considering cross-domain data sharing
under the zero-trust model, where each entity does not trust the others, existing solutions
have certain problems regarding security, fairness, scalability, and efficiency. Aiming at
solving these issues, we conduct the following research. First, a new plaintext checkable …
The cloud-edge-end architecture is suitable for many essential scenarios, such as 5 G, the Internet of Things (IoT), and mobile edge computing. Under this architecture, cross-domain and cross-layer data sharing is commonly in need. Considering cross-domain data sharing under the zero-trust model, where each entity does not trust the others, existing solutions have certain problems regarding security, fairness, scalability, and efficiency. Aiming at solving these issues, we conduct the following research. First, a new plaintext checkable encryption scheme is constructed, which can be used on lightweight IoT devices to verify the ciphertext validity sent by a data owner. Second, we propose a new multi-domain cloud-edge-end architecture based on sharding blockchains and design a cross-domain data sharing scheme under the partial trust model to achieve security, scalability, and high performance. Third, a cross-domain data sharing scheme under the zero trust model is further designed, which can ensure the fairness of both parties in data sharing. Fourth, we give a formal security definition and analysis of cross-domain data sharing. Fifth, we conduct a detailed theoretical analysis of the protocol and give an in-depth functional test and performance test, including the throughput and latency of data sharing policy registration and execution.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果