Open Access iconOpen Access

ARTICLE

Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure: A Practice of Cryptography Approach

by Mingxing Zhou1,2, Peng Xiao3, Qixu Wang1,2,*, Shuhua Ruan1,2, Xingshu Chen1,2, Menglong Yang4

1 School of Cyber Science and Engineering, Sichuan University, Chengdu, 610207, China
2 Cyber Science Research Institute, Sichuan University, Chengdu, 610207, China
3 Information Center, China Southern Power Grid Yunnan Power Grid Co., Ltd., Kunming, 650000, China
4 School of Aeronautics and Astronautics, Sichuan University, Chengdu, 610065, China

* Corresponding Author: Qixu Wang. Email: email

(This article belongs to the Special Issue: Information Security Practice and Experience: Advances and Challenges)

Computer Modeling in Engineering & Sciences 2024, 138(1), 957-979. https://doi.org/10.32604/cmes.2023.028612

Abstract

Due to the need for massive device connectivity, low communication latency, and various customizations in 6G architecture, a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario. However, the openness and heterogeneity of the 6G network cause the problems of network security. To improve the trustworthiness of 6G networks, we propose a trusted computing-based approach for establishing trust relationships in multi-cloud scenarios. The proposed method shows the relationship of trust based on dual-level verification. It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units. Firstly, SM3 algorithm establishes the chain of trust for the system’s trusted boot phase. Then, the remote attestation server (RAS) of distributed cloud units verifies the physical servers. Meanwhile, the physical servers use a ring approach to verify the cloud servers. Eventually, the centralized RAS takes one-time authentication to the critical evidence information of distributed cloud unit servers. Simultaneously, the centralized RAS also verifies the evidence of distributed RAS. We establish our proposed approach in a natural OpenStack-based cloud environment. The simulation results show that the proposed method achieves higher security with less than a 1% system performance loss.

Keywords


Cite This Article

APA Style
Zhou, M., Xiao, P., Wang, Q., Ruan, S., Chen, X. et al. (2024). Enhancing the trustworthiness of 6G based on trusted multi-cloud infrastructure: A practice of cryptography approach. Computer Modeling in Engineering & Sciences, 138(1), 957-979. https://doi.org/10.32604/cmes.2023.028612
Vancouver Style
Zhou M, Xiao P, Wang Q, Ruan S, Chen X, Yang M. Enhancing the trustworthiness of 6G based on trusted multi-cloud infrastructure: A practice of cryptography approach. Comput Model Eng Sci. 2024;138(1):957-979 https://doi.org/10.32604/cmes.2023.028612
IEEE Style
M. Zhou, P. Xiao, Q. Wang, S. Ruan, X. Chen, and M. Yang, “Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure: A Practice of Cryptography Approach,” Comput. Model. Eng. Sci., vol. 138, no. 1, pp. 957-979, 2024. https://doi.org/10.32604/cmes.2023.028612



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 675

    View

  • 437

    Download

  • 0

    Like

Share Link