| 时间: 2026-04-28 | 次数: |
林峰, 孙玉, 杨仕强,等.面向RFID应用的安全和隐私保护的边缘计算服务信任评估方案[J].河南理工大学学报(自然科学版),2026,45(3):41-48.
LIN F, SUN Y, YANG S Q, et al.A secure and privacy-preserving trust evaluation scheme for RFID-based edge computing services[J].Journal of Henan Polytechnic University(Natural Science) ,2026,45(3):41-48.
面向RFID应用的安全和隐私保护的边缘计算服务信任评估方案
林峰1,2, 孙玉3, 杨仕强2, 孙文杰2, 王剑4, 曹明生5
1.云南省交通科学研究院有限公司,云南 昆明 650041;2.云南交通工程质量检测有限公司,云南 昆明 650041;3.云南省交通投资建设集团,云南 昆明 650041;4.上海交通大学 云南(大理)研究院,云南 大理 671006;5.电子科技大学 信息与软件工程学院,四川 成都 611731
摘要:目的 针对边缘计算环境下服务质量(quality of service, QoS)的多样性、不确定性和动态性,以及物联网(internet of things, IoT)中最重要的技术——射频识别(radio frequency identification, RFID),因资源有限而采用边缘计算服务(edge computing services, ECS)的信任管理模型易导致安全和隐私泄露等问题,提出一种面向RFID应用的安全和隐私保护的边缘计算服务信任评估方案。 方法 该方案基于国密SM3哈希算法和国密SM2数字签名算法设计高可靠的数据安全交互方案,实现评估数据交互的完整性和不可否认性;设计基于非交互式范围零知识证明的高效隐私信任评估计算方法,实现边缘计算服务消费者的QoS监测值等在使用过程中的隐私保护。正确性和安全性分析表明,该方案满足边缘计算场景下服务质量评估的安全需求。 结果 大量实验验证表明,设计的方案具有较低的时间开销和通信开销,与传统边缘计算服务信任评估方案相比,该方案仅比无安全保障传统协议的时延增加100 ms的前提下,实现监测数据交互过程中的完整性、不可否认性和隐私性。 结论 该方案可以有效评估各种边缘计算服务商提供服务的信任等级,并提供等级评估过程中数据的安全和隐私功能,从而为RFID应用选择可信的边缘计算服务提供技术支撑,提升RFID的可用性。
关键词:边缘计算服务;RFID系统;隐私保护;可信评估
doi:10.16186/j.cnki.1673-9787.2024080014
基金项目:国家自然科学基金-青年科学基金资助项目(62002047);云南省交通投资建设集团有限公司科技项目(YCIC-YF-2022-05)
收稿日期:2025/02/10
修回日期:2025/04/07
出版日期:2026/04/28
A secure and privacy-preserving trust evaluation scheme for RFID-based edge computing services
Lin Feng1,2, Sun Yu3, Yang Shiqiang2, Sun Wenjie2, Wang Jian4, Cao Mingsheng5
1.Yunnan Transportation Science Research Institute Co., Ltd., Kunming 650041, Yunnan, China;2.Yunnan Traffic Engineering Quality Inspection Co., Ltd., Kunming 650041, Yunnan, China;3.Yunnan Communications Investment & Constructions Group Co., Ltd. Kunming 650041, Yunnan, China;4.Yunnan Dali Research Institute, Shanghai Jiao Tong University, Dali 671006, Yunnan, China;5.School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 611731, Sichuan, China
Abstract: Objectives In the Internet of Things (IoT), radio frequency identification (RFID), as one of the most key technologies, relies on edge computing services (ECS) to address the limitation of constrained resources. However, due to the diversity, uncertainty, and dynamic nature of quality of service (QoS) in edge computing environments, existing trust management models are vulnerable to security and privacy breaches. Methods A secure and privacy-preserving trust evaluation scheme for RFID-based edge computing services is proposed. The scheme employs the SM3 hash algorithm and SM2 digital signature algorithm to construct a highly reliable data interaction protocol, ensuring the integrity and non-repudiation of evaluation data. In addition, an efficient privacy-preserving trust evaluation method based on non-interactive range zero-knowledge proofs is designed to protect the privacy of QoS monitoring data during usage. Results Extensive experiments demonstrate that the proposed scheme achieves low time and communication overhead. Compared with traditional trust evaluation schemes, it introduces only an additional delay of 100 ms while ensuring data integrity, non-repudiation, and privacy during data interactions. Conclusions The proposed scheme can effectively evaluate the trust levels of edge computing services and ensure data security and privacy during the evaluation process, thereby providing technical support for RFID applications to select reliable services and improving system usability.
Key words:edge computing services;RFID systems;privacy protection;trust evaluation