版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China School of Computer Science and Communication Engineering the Dean of Department of Communication Engineering Jiangsu University Zhenjiang China
出 版 物:《IAENG International Journal of Computer Science》 (IAENG Int. J. Comput. Sci.)
年 卷 期:2025年第52卷第1期
页 面:38-45页
核心收录:
基 金:This work was supported by in part by the National Natural Science Foundation of China (62276116) Future Network Scientific Research Fund Project of Jiangsu Province (FNSRFP-2021-YB-49) and the National College Student Innovation and Entrepreneurship Training Program Project (202410299052Z)
主 题:Authentication
摘 要:Named in-network computing service (NICS) is a potential computing paradigm emerged recently. Benefitted from the characteristics of named addressing and routing, NICS can be flexibly deployed on NDN router side and provide nearby computing service to Internet users. But the NICS feature of dynamic deployment also causes serious security risk of access control. How to independently check out the subscription relationship between requester and requested computing service on NICS side become a challenge. To solve this problem, we propose a novel certificateless signature-based access control scheme (CS-ACS) in this paper. In CS-ACS, the entire user public-private key pairs consist of two parts, user side and source server side. Where, the user public-private key pairs (server side) are generated according to the user ID, service subscription relationship and subscription expiration time. Based on this special design, when authorized user signs the interest packet of invoking specific service using its private key, the NICS can verify the signature then check out whether the requester is a valid subscriber and the subscription is expired or not. Simulation results show that, comparing with fundamental solutions, CS-ACS can avoid extra secret key storage cost on NICS side and markedly shorten authentication delay. © (2025), (International Association of Engineers). All rights reserved.