Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data security authentication method between cloud and edge node

An edge node and authentication method technology, applied in the field of communication security, can solve the problems of identity counterfeiting, limited computing resources, complex communication protocols, etc., and achieve the effects of fast computing speed, lightweight encryption function, and small storage space

Active Publication Date: 2020-06-16
国家工业信息安全发展研究中心
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the edge computing scenario, the edge cloud and edge nodes can process and analyze data nearby, and the cloud is responsible for centralized data processing and storage. Nodes have limited computing resources, complex communication protocols, and insufficient security functions, which can easily become a springboard for attacks to penetrate into the cloud
In addition, most of the existing industrial communication protocols do not provide authentication functions, which leads to security issues such as identity counterfeiting. This invention is mainly used to solve the two-way identity authentication problem between edge nodes and the cloud to ensure safe and efficient communication between edge nodes and the cloud

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security authentication method between cloud and edge node
  • Data security authentication method between cloud and edge node
  • Data security authentication method between cloud and edge node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to further illustrate the technical means and effects adopted by the present invention to achieve the intended purpose, the present invention will be described in detail below in conjunction with the accompanying drawings and preferred embodiments.

[0048] With the development of the industrial Internet platform, industrial data uploading to the cloud has become the only way to realize intelligent production and operation in the industrial field. However, the data volume of the industrial Internet is huge, the real-time requirements are high, and the data is uploaded to the cloud in various forms. From the perspective of data sources and typical application requirements, there are six forms of industrial Internet data upload and download, namely: the transmission between cloud and collaborative layer office network data, the purpose is to promote the collaboration and intelligence of enterprise office business systems; The main purpose of the data transmission...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data security authentication method between a cloud and an edge node, and the method provides a bidirectional identity authentication protocol between the edge node and the cloud, can guarantee the authenticity and effectiveness of the identities of the cloud and the edge node, prevents malicious attacks from permeating into a core network, and greatly guarantees the industrial Internet security. According to the method, an elliptic curve cryptographic algorithm is introduced to encrypt key data in an authentication process; the algorithm key size, the system parameters and the storage space are relatively small; operation speed is high, the highest safety intensity per bit is realized; the method is suitable for an authentication environment of edge computing nodes with limited computing resources and storage resources. According to the method, the data plaintext transmission leakage risk is avoided, the replay attack is avoided through the timestamp, the hashiterative operation of the one-time password authentication protocol is simplified, compared with the original authentication protocol, the security is higher, the operation efficiency is also improved, and the authentication security requirement can be met under the environment that the edge node resources are limited.

Description

technical field [0001] The invention relates to the technical field of communication security, in particular to a data security authentication method between a cloud and an edge node. Background technique [0002] At present, the Industrial Internet has gradually become an emerging industrial application model. Among them, the Industrial Internet platform is an important hub connecting industrial enterprises and user enterprises, which has greatly promoted the intelligentization and efficiency of industrial production, but the centralized cloud processing has intensified Cloud load, born to reduce the cloud load of the industrial Internet platform and edge computing applications. In the edge computing scenario, the edge cloud and edge nodes can process and analyze data nearby, and the cloud is responsible for centralized data processing and storage. Nodes have limited computing resources, complex communication protocols, and insufficient security functions, which can easily...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08H04L9/30
CPCH04L63/0869H04L63/0428H04L9/3236H04L9/3297H04L9/0869H04L9/3066H04L63/1441H04L65/1073
Inventor 柳彩云何小龙孙岩陈雪鸿杨帅锋李俊
Owner 国家工业信息安全发展研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products