Paper
5 May 2022 A remote attestation model and protocol for multimedia mobile edge computing security
Dongxia Shao, Lili Zhang, Zhiyong Zhang
Author Affiliations +
Proceedings Volume 12245, International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2022); 122450M (2022) https://doi.org/10.1117/12.2635966
Event: International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2022), 2022, Sanya, China
Abstract
In the Multimedia Mobile Edge Computing (MMEC) environment, cryptography technology is used to ensure secure transmission of multimedia data when Terminal accesses to MMEC or Terminal accesses to the central cloud. However, the problem of the participants’ identity authentication and integrity measurement can not be solved. Therefore, in this paper, a novel remote attestation model and protocol is proposed, which introduces mutual anonymous identity authentication, mutual integrity measurement and verification between Terminal and MMEC as well as between MMEC and cloud. Moreover, the proposed protocol guarantees data security and identity security of the platform, as well as integrity state maintenance when MMEC interacts with Terminal. We make a thorough security analysis and performance simulation over the proposed protocol. Security analysis shows that the proposed protocol is superior to the other two similar schemes in terms of privacy protection ability and anti-attack ability. Performance simulation results demonstrate that the remote attestation protocol with non-intensive requests state achieve much higher efficiency.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Dongxia Shao, Lili Zhang, and Zhiyong Zhang "A remote attestation model and protocol for multimedia mobile edge computing security", Proc. SPIE 12245, International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2022), 122450M (5 May 2022); https://doi.org/10.1117/12.2635966
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Multimedia

Clouds

Information security

Measurement devices

Back to Top