大数据 ›› 2019, Vol. 5 ›› Issue (2): 34-52.doi: 10.11959/j.issn.2096-0271.2019012

所属专题: 边缘计算

• 专题:边缘计算 • 上一篇    下一篇

边缘计算安全技术综述

凌捷,陈家辉,罗玉,张思亮   

  1. 广东工业大学计算机学院,广东 广州 510006
  • 出版日期:2019-03-15 发布日期:2019-04-04
  • 作者简介:凌捷(1964- ),男,博士,广东工业大学计算机学院二级教授,主要研究方向为网络信息安全、智能视频处理技术等。|陈家辉(1986- ),男,博士,广东工业大学计算机学院讲师,主要研究方向为后量子密码学、区块链技术及云安全。|罗玉(1991- ),女,博士,广东工业大学计算机学院讲师,主要研究方向为人工智能、计算机视觉等。|张思亮(1996- ),男,广东工业大学计算机学院硕士生,主要研究方向为网络与信息安全技术。
  • 基金资助:
    国家自然科学基金资助项目(61702112);广州市科技计划基金资助项目(201802010043);广州市科技计划基金资助项目(201807010058)

A survey on the security technology of edge computing

Jie LING,Jiahui CHEN,Yu LUO,Siliang ZHANG   

  1. School of Computers,Guangdong University of Technology,Guangzhou 510006,China
  • Online:2019-03-15 Published:2019-04-04
  • Supported by:
    The National Natural Science Foundation of China(61702112);Science and Technology Project of Guangzhou(201802010043);Science and Technology Project of Guangzhou(201807010058)

摘要:

随着物联网应用的不断展开,大量移动终端设备参与服务计算,传统的云计算模型已经不能满足网络边缘设备产生数据的速度,边缘计算模型应运而生,并成为近几年的研究热点。介绍了边缘计算的概念和物联网的边缘计算参考模型,分析总结了边缘设备容易遭受的攻击,综述了边缘计算中密码安全技术的主要研究成果,并指出:对称密码技术不适用于边缘设备之间的通信,基于身份标识的密码技术较适用于边缘设备到边缘设备的通信,基于配对的密码技术较适用于边缘设备到基站的通信。讨论了两种后量子密码技术在边缘设备中的应用,提出了边缘计算安全技术研究的几个建议。

关键词: 边缘计算, ;物联网, 边缘设备, 云计算, 密码技术

Abstract:

With the continuous development of Internet of things applications,a large number of mobile terminal devices participate in service computing.Traditional cloud computing models cannot adapt to the rapid growth of data generated by network edge devices,and edge computing models emerge and become a research hotspot in recent years.The concept of edge computing and the reference model of edge computing in the Internet of things were introduced,the vulnerabilities of edge devices and the main research results of cryptographic security technology in edge computing were summarized,and that symmetric cryptography technology is not suitable for communication between edge devices,and identity-based cryptography technology is more suitable for communication between edge devices and edge devices was pointed out.Paired-based cryptography is more suitable for the communication between edge devices and base stations.The application of two post-quantum cryptography technologies in edge devices was discussed.Finally,some suggestions on the research of edge computing security technology were put forward.

Key words: edge computing, Internet of things, edge device, cloud computing, cryptography technology

中图分类号: 

No Suggested Reading articles found!