چکیده
مقدمه
اولیه
رایانش مه کوانتومی
تحلیل امنیتی
نتیجه گیری
منابع
Abstract
Introduction
Preliminary
Quantum fog computing
Security analysis
Conclusion
References
چکیده
به عنوان یک پلت فرم خدمات محاسباتی نزدیک به کاربران، محاسبات مه مزایای بسیاری مانند تأخیر بسیار کم، تحرک خوب، درک دقیق مکان و توزیع گسترده دارد. در سال های اخیر به سرعت توسعه یافته است. با این حال، به دلیل توزیع گسترده گرههای مه، محیطهای پیچیده شبکه و منابع محدود، امنیت گرههای مه در برابر انواع حملات، مانند انکار سرویس و سوء استفاده از منابع آسیبپذیر است. به منظور مقابله مؤثر با این حملات، این مقاله یک مدل محاسباتی مه کوانتومی مبتنی بر محاسبات کوانتومی کور و اشتراکگذاری راز کوانتومی قابل تأیید را پیشنهاد میکند. این مدل عمدتاً بر محاسبات کوانتومی کور تکیه دارد تا ویژگیهای عملیات مشترک امنیتی گرههای مه چندگانه و ویژگیهای حفاظتی قابل تأیید هویت و تشخیص کانال ارائه شده توسط پروتکل اشتراکگذاری مخفی کوانتومی را درک کند، که نه تنها میتواند عملکردهای محاسبات مه کلاسیک را انجام دهد. ، بلکه امنیت انتقال اطلاعات و محاسبه داده ها را تضمین می کند. از طریق تجزیه و تحلیل کامل امنیتی، مدل جدید محاسبات مه کوانتومی ارائه شده در این مقاله می تواند به طور موثر در برابر انواع حملات محاسباتی مه مقاومت کند، بنابراین حفاظت از امنیت اطلاعات در محتوا و فرآیند محاسبات مه به دست می آید.
توجه! این متن ترجمه ماشینی بوده و توسط مترجمین ای ترجمه، ترجمه نشده است.
Abstract
As a computing service platform closer to users, fog computing has many advantages such as extremely low latency, good mobility, accurate location perception and wide distribution. It has developed rapidly in recent years. However, due to the wide distribution of fog nodes, complex network environments, and limited resources, the security of fog nodes is vulnerable to a variety of attacks, such as denial of service and abuse of resources. In order to effectively deal with these attacks, this paper proposes a quantum fog computing model based on blind quantum computation and verifiable quantum secret sharing. The model mainly relies on blind quantum computation to realize the security joint operation characteristics of multiple fog nodes, and the identity verifiable and channel detection protection features provided by the quantum secret sharing protocol, which can not only efficiently perform the functions of the classic fog computing, but also guarantee the security of information transmission and data calculation. Through the complete security analysis, the new quantum fog computing model proposed in this paper can effectively resist on a variety of fog computing attacks, thus achieving information security protection in both the content and process of fog computing.
Introduction
Since its concept was frst proposed in 2006, cloud computing, as a confgurable shared computing resource pool model (Peter Mell 2011), has developed rapidly over the past decade. Users can access and send requests at any time through the network, which greatly reduces the cost of information interaction with the server. Later, with the rise and development of the Internet of Things, Internet technology began to expand to the edge. The practical application of the Internet of Things generally requires virtual reality information interaction through cloud computing, big data and artifcial intelligence. With the gradual application of cloud computing, it is found that there are complex resource allocation, low service delay, inability to solve local services in real time, and poor mobility. The fog computing is thus generated. As a new computing model, fog computing is an “edge” extension of cloud computing. The fog computing is between the cloud computing data center and the users, providing computing, storage and services to the end user.
Conclusion
In order to efectively deal with various security attacks that are difcult to solve in classical fog computing, this paper proposes a novel quantum fog computing model based on blind quantum computation and verifable quantum secret sharing. The new model makes full use of blind quantum computation to perform secure joint calculation by using multiple quantum fog nodes with limited computing power in an untrusted computing environment to ensure the security of computational content. At the same time, it also makes full use of the identity verifcation of the quantum secret sharing protocol, and realizes the security protection of the information transmission process. The quantum fog computing proposed in this paper absorbs the advantages of both, fully considers the physical properties of quantum, and combines it with the classical fog computing model. The quantum fog computing can not only efciently complete the functions of the classic fog computing, but also ensure the security of information transmission and calculation.