Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues

被引:301
作者
Zhang, Jiale [1 ]
Chen, Bing [1 ]
Zhao, Yanchao [1 ]
Cheng, Xiang [1 ]
Hu, Feng [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Edge computing; data security; cryptography; authentication; access control; privacy; PROXY RE-ENCRYPTION; FULLY HOMOMORPHIC ENCRYPTION; KEYWORD RANKED SEARCH; DATA ACCESS-CONTROL; AUTHENTICATION SCHEME; CLOUD DATA; EFFICIENT; INTERNET; TAXONOMY; CRYPTOSYSTEM;
D O I
10.1109/ACCESS.2018.2820162
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the explosive growth of Internet of Things devices and massive data produced at the edge of the network, the traditional centralized cloud computing model has come to a bottleneck due to the bandwidth limitation and resources constraint. Therefore, edge computing, which enables storing and processing data at the edge of the network, has emerged as a promising technology in recent years. However, the unique features of edge computing, such as content perception, real-time computing, and parallel processing, has also introduced several new challenges in the field of data security and privacy preserving, which are also the key concerns of the other prevailing computing paradigms, such as cloud computing, mobile cloud computing, and fog computing. Despites its importance, there still lacks a survey on the recent research advance of data security and privacy-preserving in the field of edge computing. In this paper, we present a comprehensive analysis of the data security and privacy threats, protection technologies, and countermeasures inherent in edge computing. Specifically, we first make an overview of edge computing, including forming factors, definition, architecture, and several essential applications. Next, a detailed analysis of data security and privacy requirements, challenges, and mechanisms in edge computing are presented. Then, the cryptography-based technologies for solving data security and privacy issues are summarized. The state-of-the-art data security and privacy solutions in edge-related paradigms are also surveyed. Finally, we propose several open research directions of data security in the field of edge computing.
引用
收藏
页码:18209 / 18237
页数:29
相关论文
共 149 条
[1]   Fog Computing and Smart Gateway Based Communication for Cloud of Things [J].
Aazam, Mohammad ;
Huh, Eui-Nam .
2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, :464-470
[2]   Mobile Edge Computing: A Survey [J].
Abbas, Nasir ;
Zhang, Yan ;
Taherkordi, Amir ;
Skeie, Tor .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :450-465
[3]   Design Considerations for a 5G Network Architecture [J].
Agyapong, Patrick Kwadwo ;
Iwamura, Mikio ;
Staehle, Dirk ;
Kiess, Wolfgang ;
Benjebbour, Anass .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (11) :65-75
[4]  
Ahn G.-J., 2000, ACM Transactions on Information and Systems Security, V3, P207, DOI 10.1145/382912.382913
[5]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[6]   Authentication in mobile cloud computing: A survey [J].
Alizadeh, Mojtaba ;
Abolfazli, Saeid ;
Zamani, Mazdak ;
Baharun, Sabariah ;
Sakurai, Kouichi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :59-80
[7]   A Distributed Access Control Architecture for Cloud Computing [J].
Almutairi, Abdulrahman A. ;
Sarfraz, Muhammad I. ;
Basalamah, Saleh ;
Aref, Walid G. ;
Ghafoor, Arif .
IEEE SOFTWARE, 2012, 29 (02) :36-44
[8]  
[Anonymous], CISC VIS NETW IND GL
[9]  
[Anonymous], 2011, PROC INT WORKSHOP PU
[10]  
[Anonymous], 2010, Cluster of European Research Projects on the Internet of Things, DOI [DOI 10.2759/26127, 10.2759/26127]