skip to main content
10.1145/3654446.3654508acmotherconferencesArticle/Chapter ViewAbstractPublication PagesspcncConference Proceedingsconference-collections
research-article

Lightweight Trusted Identity Architecture Based on Industrial Internet Cloud Edge Collaboration Technology

Published:03 May 2024Publication History

ABSTRACT

In industrial Internet system, data security and privacy protection are very important, and data interaction and collaboration need fast and reliable network connection. Lightweight trusted identity architecture needs to support high-speed data transmission and processing, and provide secure authentication and access control mechanisms to prevent unauthorized access and malicious attacks. Therefore, a lightweight trusted identity architecture based on cloud-side collaboration technology of industrial Internet is designed. The data collector is used to collect the lightweight trusted identification data of industrial Internet, and a task scheduling model of industrial Internet is constructed based on cloud-side collaboration technology. On this basis, combined with industrial Internet, trusted applications and logo authorities, the lightweight trusted logo architecture is designed. The experimental results show that the proposed method has high confidence and accuracy of verification information, and can accurately detect and identify industrial Internet attacks, and take corresponding countermeasures in time, thus protecting users' network security.

References

  1. Alassery, F. 2022. Predictive maintenance for cyber physical systems using neural network based on deep soft sensor and industrial internet of things. Computers and Electrical Engineering, 101: 108062.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Goyat, R., Kumar, G., Saha, R. 2023. RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things. Cluster Computing, 2023: 1-23.Google ScholarGoogle Scholar
  3. Deebak, B. D., Fadi, A. L. T. 2022. A robust and distributed architecture for 5G-enabled networks in the smart blockchain era. Computer Communications, 181: 293-308.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bouras, M. A., Lu, Q., Dhelim, S. 2021. A lightweight blockchain-based IoT identity management approach. Future Internet, 13(2): 24-32.Google ScholarGoogle ScholarCross RefCross Ref
  5. Ben Saad, S., Ksentini, A., Brik, B. 2022. An end‐to‐end trusted architecture for network slicing in 5G and beyond networks. Security and Privacy, 5(1): e186-e172.Google ScholarGoogle ScholarCross RefCross Ref
  6. Hussain, S., Ullah, I., Khattak, H. 2021. A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT). Journal of Information Security and Applications, 58: 102625.Google ScholarGoogle ScholarCross RefCross Ref
  7. Niveditha, V. R., Usha, D., Rajakumar, P. S. 2021. Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform. International Journal of e-Collaboration (IJeC), 17(4): 122-131.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Liu, Y., Zang, Y., Zhu, C. 2021. Research on Monitoring Application of Railway Unattended Station Based on Edge Computing. Computer Simulation, 38(03): 51-55.Google ScholarGoogle Scholar

Index Terms

  1. Lightweight Trusted Identity Architecture Based on Industrial Internet Cloud Edge Collaboration Technology

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SPCNC '23: Proceedings of the 2nd International Conference on Signal Processing, Computer Networks and Communications
      December 2023
      435 pages
      ISBN:9798400716430
      DOI:10.1145/3654446

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 May 2024

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format