You can view the full text of this article for free using the link below.

Title: The correction method of block authentication information in edge computing mode

Authors: Jianbo Xu; Wei Jian; Hongbo Zhou; Wei Liang; Meng-Yen Hsieh; Changxu Wan

Addresses: School of Software, Quanzhou University of Information Engineering, Fujian, Quanzhou, China ' Hunan University of Science and Technology, Taoyuan Road, Yuhu District, Xiangtan City, Hunan Province, China ' School of Software, Quanzhou University of Information Engineering, Fujian, Quanzhou, China ' Hunan University of Science and Technology, Taoyuan Road, Yuhu District, Xiangtan City, Hunan Province, China ' Providence University, Dadu Mountain in Shalu District, Taichung City, Taiwan ' Hunan University of Science and Technology, Taoyuan Road, Yuhu District, Xiangtan City, Hunan Province, China

Abstract: In many industrial edge computing applications, terminal devices are often remote and widely distributed. To achieve cross-domain authentication, some researchers store authentication information on a blockchain network built by edge nodes. However, since terminal equipment may be damaged or require updates to its authentication parameters, a trusted solution for deleting and modifying blockchain-stored authentication information is needed. This paper proposes using chameleon hash trap technology to maintain blockchain integrity while enabling data correction. Experimental results show that the scheme efficiently generates and distributes sub-private keys for modifying on-chain authentication data. The modifiable blockchain is well-suited for maintaining device authentication information, ensuring system security and maintainability, and improving communication efficiency.

Keywords: blockchain; edge computing; authentication; key agreement.

DOI: 10.1504/IJES.2024.144353

International Journal of Embedded Systems, 2024 Vol.17 No.3/4, pp.213 - 223

Received: 24 Oct 2023
Accepted: 10 Apr 2024

Published online: 10 Feb 2025 *

Full-text access for editors Full-text access for subscribers Free access Comment on this article