计算机科学
加密时值
企业信息安全体系结构
计算机安全模型
保安服务
保密
分布式系统安全体系结构
资产(计算机安全)
云安全计算
信息安全
安全信息和事件管理
分布式计算
计算机安全
加密
云计算
操作系统
作者
Wenya Song,Jing Tian,Xiaole Li,Xing Wang
标识
DOI:10.1109/cisp-bmei56279.2022.9980140
摘要
The design process of security architecture in edge computing is of high complexity. Manual design is always inefficient and error prone, while automatic design cannot be widely used due to calculation explosion. Combining the goodness of these two ways, we propose a new restructable strategy for security architecture in edge computing. Firstly, we leverage automatic tool to generate critical security activities for information transmission, including challenge-response, creation of nonce and secret, encryption and decryption, addition of attribute set, message sending and receiving. These primitives can be specified according to various security requirements. Secondly, according to the five kinds of restructable rules, we construct security modules of identity authentication, information secrecy, information integrity, non-repudiation and user privacy. At last, according to security requirements in edge computing, we can obtain security architecture and verify security modules with composition rules. In the application field of information transmission, security goals can be realized, even for multiple interactions between different pairs of users and service providers. Compared with manual method from security and efficiency, the new strategy provides a more convenient and secure way for security architecture design.
科研通智能强力驱动
Strongly Powered by AbleSci AI