Article Preview
TopA User Authentication Schema Under The Integration Of Mobile Edge Computing And Blockchain Technology
User identity authentication technology is used to identify entity identity in the network world. Correct identity authentication and identification are primary gateways of establishing information system protection; moreover, it is the fundament of building the mutual trust relationship between communication parties (Kaladevi et al., 2022; Su & Long, 2021; S. Wang et al., 2020).
The mobile Internet of Things (IoT) has many problems in data sharing, for example, data redundancy, data security cannot be guaranteed, and a low efficiency of data sharing (Cui et al., 2022; Sandhiya et al., 2021).
Mobile edge computing can decentralize the computing and storage task of central nodes by using multiple edge nodes with the aim of reducing the burden of central nodes; it has been widely applied in mobile networks (Chen et al., 2021; H. Q. Liu et al., 2022; W. Zhang et al., 2022). As a result, it is crucial to introduce moving edge computing to propose an efficient user authentication algorithm.
Traditional user identity authentication schemes mainly include offline identity authentication and centralized electronic identity authentication (Z. Wang et al., 2020). Both have privacy problems that include excessive exposure of user information, which makes it easy to disclose a user’s privacy information (Gao et al., 2021; Hongbin & Zhi, 2023).
The current rapid development of blockchain technology provides new methods to solve the above problems. The emergence of blockchain technology handles the trust problems that exist in traditional centralized applications, enabling all blockchain nodes to successfully complete data interaction without mutual trust. Many existing schemes often have the following problems (Chen et al. 2023): 1) Edge nodes lack reliable authentication protocols, which leads to certain security risks in the received data from terminals; 2) While ensuring trusted identity authentication, the blockchain network layer is prone to significant storage or computational burden; 3) The overall computational and communication costs of the system are difficult to balance, resulting in poor real-time service response.
Different strategies can be adopted in face of the previously mentioned three issues. Among these are: