Telecommunications Science ›› 2018, Vol. 34 ›› Issue (7): 135-147.doi: 10.11959/j.issn.1000-0801.2018181
Special Issue: 边缘计算
• Enterprises: • Previous Articles Next Articles
Xingshuo AN1,Guixing CAO2,Li MIAO1,Shubo REN2,Fuhong LIN1
Online:
2018-07-20
Published:
2018-07-28
Supported by:
CLC Number:
Xingshuo AN, Guixing CAO, Li MIAO, Shubo REN, Fuhong LIN. Security of intelligent edge computing:a survey[J]. Telecommunications Science, 2018, 34(7): 135-147.
[1] | 王计艳, 王晓周, 吴倩 ,等. 面向NB-IoT的核心网业务模型和组网方案[J]. 电信科学, 2017,33(4): 148-154. WANG J Y , WANG X Z , WU Q ,et al. Core network service model and networking scheme oriented NB-IoT[J]. Telecommunications Science, 2017,33(4): 148-154. |
[2] | SHI W , CAO J , ZHANG Q ,et al. Edge computing:vision and challenges[J]. IEEE Internet of Things Journal, 2016,3(5): 637-646. |
[3] | IBM & AKAMAI . Develop edge computing application[EB]. 2003. |
[4] | PANG H H , TAN K L . Authenticating query results in edge computing[C]// 20th International Conference on Data Engineering,March 30-April 2,2004,Boston,MA,USA. Piscataway:IEEE Press, 2004: 560-571. |
[5] | GAZIS V , LEONARDI A , MATHIOUDAKIS K ,et al. Components of fog computing in an industrial internet of things context[C]// 2015 12th Annual IEEE International Conference on Sensing,Communication and Networking-Workshops (SECON Workshops),June 22-25,2015,Seattle,WA,USA. Piscataway:IEEE Press, 2015: 1-6. |
[6] | FARUQUE M A A , VATANPARVAR K . Energy management-as-a-service over fog computing platform[J]. IEEE Internet of Things Journal, 2016,3(2): 161-169. |
[7] | ZENG D , GU L , GUO S ,et al. Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system[J]. IEEE Transactions on Computers, 2016,65(12): 3702-3712. |
[8] | SEHGAL V K , PATRICK A , SONI A ,et al. Smart human security framework using internet of things,cloud and fog computing[M]. Berlin: SpringerPress, 2015: 251-263. |
[9] | 罗萱, 叶通, 金耀辉 ,等. 云计算数据中心网络研究综述[J]. 电信科学, 2014,30(2): 99-104. LUO X , YE T , JIN Y H ,et al. Survey on data center network for cloud computing[J]. Telecommunications Science, 2014,30(2): 99-104. |
[10] | DINH H T , LEE C , NIYATO D ,et al. A survey of mobile cloud computing:architecture,applications,and approaches[J]. Wireless Communications & Mobile Computing, 2013,13(18): 1587-1611. |
[11] | BONOMI F , . Connected vehicles,the internet of things,and fog computing[C]// The Eighth ACM International Workshop on Vehicular Inter-Networking (VANET),Sept 23,2011,Las Vegas,Nevada,USA. New York:ACM Press, 2011: 13-15. |
[12] | BONOMI F , MILITO R , ZHU J ,et al. Fog computing and its role in the internet of things[C]// The First Edition of the MCC Workshop on Mobile Cloud Computing,August 13-17,2012,Helsinki,Finland. New York:ACM Press, 2012: 13-16. |
[13] | GAMLO A H , ZHANG N . Mobile cloud computing:security analysis[C]// 2017 IEEE International Conference on Mobile Cloud Computing,Services and Engineering,April 6-8,2017,San Francisco,CA,USA. Piscataway:IEEE Press, 2017: 191-198. |
[14] | SATYANARAYANAN M , LEWIS G , MORRIS E ,et al. The role of cloudlets in hostile environments[J]. IEEE Pervasive Computing, 2013,12(4): 40-49. |
[15] | BONOMI F , MILITO R , ZHU J ,et al. Fog computing and its role in the internet of things[C]// Edition of the MCC Workshop on Mobile Cloud Computing,August 17,2012,Helsinki,Finland. New York:ACM Press, 2012: 13-16. |
[16] | ZHANIKEEV M . A cloud visitation platform to facilitate cloud federation and fog computing[J]. Computer, 2015,48(5): 80-83. |
[17] | STOJMENOVIC I , WEN S . The fog computing paradigm:Scenarios and security issues[C]// 2014 Federated Conference on Computer Science and Information Systems (FedCSIS),Sept 7-10,2014,Warsaw,Poland. Piscataway:IEEE Press, 2014: 1-8. |
[18] | DASTJERDI A V , BUYYA R . Fog computing:helping the internet of things realize its potential[J]. Computer, 2016,49(8): 112-116. |
[19] | SONMEZ C , OZGOVDE A , ERSOY C . EdgeCloudSim:an environment for performance evaluation of edge computing systems[C]// 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),May 8-11,2017,Valencia,Spain. Piscataway:IEEE Press, 2017: 39-44. |
[20] | HU Y C , PATEL M , SABELLA D ,et al. Mobile edge computing—a key technology towards 5G[R]. 2015,11(11): 1-16. |
[21] | CAU E , CORICI M , BELLAVISTA P ,et al. Efficient exploitation of mobile edge computing for virtualized 5G in EPC architectures[C]// 2016 4th IEEE International Conference on Mobile Cloud Computing,Services,and Engineering (Mobile Cloud),August 8-11,2016,Beijing,China. Piscataway:IEEE Press, 2016: 100-109. |
[22] | AHMED A , AHMED E . A survey on mobile edge computing[C]// 2016 10th International Conference on Intelligent Systems and Control (ISCO),Jan 6-7,2016,Coimbatore,Tamilnadu,India. Piscataway:IEEE Press, 2016: 1-8. |
[23] | KLAS G I . Fog computing and mobile edge cloud gain momentum open fog consortium,ETSI MEC and Cloudlets[EB].2015. 2015. |
[24] | RIMAL B P , VAN D P , MAIER M . Mobile edge computing empowered fiber-wireless access networks in the 5G era[J]. IEEE Communications Magazine, 2017,55(2): 192-200. |
[25] | MAHMUD M , AFRIN M , RAZZAQUE M ,et al. Maximizing quality of experience through context‐aware mobile application scheduling in cloudlet infrastructure[J]. Software:Practice and Experience, 2016,46(11): 1525-1545. |
[26] | SANAEI Z , ABOLFAZLI S , GANI A ,et al. Heterogeneity in mobile cloud computing:taxonomy and open challenges[J]. IEEE Communications Surveys & Tutorials, 2014,16(1): 369-392. |
[27] | BAHL P , HAN R Y , LI L E ,et al. Advancing the state of mobile cloud computing[C]// The Third ACM Workshop on Mobile Cloud Computing and Services,June 25-29,2012,Low Wood Bay,UK. New York:ACM Press, 2012: 21-28. |
[28] | ALRAWAIS A , ALHOTHAILY A , HU C ,et al. Fog computing for the internet of things:security and privacy issues[J]. IEEE Internet Computing, 2017,21(2): 34-42. |
[29] | BONOMI F , MILITO R , ZHU J ,et al. Fog computing and its role in the internet of things[C]// The first edition of the MCC Workshop on Mobile Cloud Computing,August 17,2012,Helsinki,Finland. New York:ACM Press, 2012: 13-16. |
[30] | BHARDWAJ K , SHIH M W , AGARWAL P ,et al. Fast,scalable and secure onloading of edge functions using AirBox[C]// 2016 IEEE/ACM Symposium on Edge Computing (SEC),Oct 27-28,2016,Seattle,WA,USA. Piscataway:IEEE Press, 2016: 14-27. |
[31] | SHI W , CAO J , ZHANG Q ,et al. Edge computing:vision and challenges[J]. IEEE Internet of Things Journal, 2016,3(5): 637-646. |
[32] | Open mHealth.Open mHealth platform[EB]. 2016. |
[33] | ESPOSITO C , CASTIGLIONE A , POP F ,et al. Challenges of connecting edge and cloud computing:a security and forensic perspective[J]. IEEE Cloud Computing, 2017,4(2): 13-17. |
[34] | MACH P , BECVAR Z . Mobile edge computing:a survey on architecture and computation offloading[J]. IEEE Communications Surveys&Tutorials, 2017(99):1. |
[35] | ROMAN R , LOPEZ J , MAMBO M Fog et al . Mobile edge computing,Fog et al.:A survey and analysis of security threats and challenges[J]. Future Generation Computer Systems. arXiv:1602, 2016:00484. |
[36] | MTIBAA A , HARRAS K , ALNUWEIRI H . Friend or foe? Detecting and isolating malicious nodes in mobile edge computing platforms[C]// 2016 IEEE International Conference on Cloud Computing Technology and Science,Dec 12-15,2016,Luxembourg City,Luxembourg. Piscataway:IEEE Press, 2016: 42-49. |
[37] | VASSILAKIS V , CHOCHLIOUROS I P , SPILIOPOULOU A S ,et al. Security analysis of mobile edge computing in virtualized small cell networks[C]// 2016 IFIP International Conference on Artificial Intelligence Applications and Innovations,Sept 16–18,2016,Thessaloniki,Greece. Berlin:Springer, 2016: 653-665. |
[38] | ZHOU C V , LECKIE C , KARUNASEKERA S . A survey of coordinated attacks and collaborative intrusion detection[J]. Computers & Security, 2010,29(1): 124-140. |
[39] | MAZZARIELLO C , BIFULCO R , CANONICO R . Integrating a network ids into an open source cloud computing environment[C]// 2010 Sixth International Conference on Information Assurance and Security (IAS),June 23-25,2010,Miyazaki,Japan. Piscataway:IEEE Press, 2010: 265-270. |
[40] | GUL I , HUSSAIN M . Distributed cloud intrusion detection model[J]. International Journal of Advanced Science and Technology, 2011(34): 71-82. |
[41] | RAZA S , WALLGREN L , VOIGT T . SVELTE:real-time intrusion detection in the internet of things[J]. Ad Hoc Networks, 2013,11(8): 2661-2674. |
[42] | SHAMSHIRBAND S , PATEL A , ANUAR N B ,et al. Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks[J]. Engineering Applications of Artificial Intelligence, 2014(32): 228-241. |
[43] | 肖阳, 白磊, 王仙 . 基于朋友机制的移动 Ad Hoc 网络路由入侵检测模型研究[J]. 通信学报, 2015,36(S1): 203-214. XIAO Y , BAI L , WANG X . Friends mechanism-based routing intrusion detection model for mobile Ad Hoc network[J]. Journal on Communications, 2015,36(S1): 203-214. |
[44] | HOSSEINPOUR F , AMOLI P V , PLOSILA J ,et al. An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach[J]. International Journal of Digital Content Technology & Its Applications, 2016,10(5). |
[45] | WANG Y , XIE L , LI W ,et al. A privacy-preserving framework for collaborative intrusion detection networks through fog computing[C]// 2017 International Symposium on Cyberspace Safety and Security,October 23-25,2017,Xi’an,China. Berlin:Springer, 2017: 267-279. |
[46] | AN X , ZHOU X , XING L ,et al. Sample selected extreme learning machine based intrusion detection in fog computing and MEC[J]. Wireless Communications & Mobile Computing, 2018: 1-10. |
[47] | LIN F H , ZHOU Y T , AN X S ,et al. Fair resource allocation in intrusion detection system for edge computing[J]. IEEE Consumer Electronics Magazine (Accepted). |
[48] | PERVEZ Z , KHATTAK A M , LEE S ,et al. Oblivious access control policies for cloud based data sharing systems[J]. Computing, 2012,94(12): 915-938. |
[49] | YANG K , JIA X , REN K ,et al. DAC-MACS:effective data access control for multiauthority cloud storage systems[J]. IEEE Transactions on Information Forensics and Security, 2013,8(11): 1790-1801. |
[50] | GUO J W , ZHOU X W , YUAN J L ,et al. Secure access control guarding against internal attacks in distributed networks[J]. Wireless Personal Communications, 2013,68(4): 1595-1609. |
[51] | POPESCU D E , LONEA A M . An hybrid text-image based authentication for cloud services[J]. International Journal of Computers Communications & Control, 2013,8(2): 263-274. |
[52] | JIVANADHAM L B , ISLAM A K M , KATAYAMA Y ,et al. Cloud cognitive authenticator (CCA):a public cloud computing authentication mechanism[C]// 2013 International Conference on Informatics,Electronics & Vision (ICIEV),May 17-18,2013,Dhaka,Bangladesh. Piscataway:IEEE Press, 2013: 1-6. |
[53] | WANG Z , SHA K , LV W . Slight homomorphic signature for access controlling in cloud computing[J]. Wireless personal communications, 2013,73(1): 51-61. |
[54] | ZOU B , ZHANG H . Integrity protection and attestation of security critical executions on virtualized platform in cloud computing environment[C]// The 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber,Physical and Social Computing,August 20-23,2013,Beijing,China. Piscataway:IEEE Press, 2013: 2071-2075. |
[55] | RUJ S , STOJMENOVIC M , NAYAK A . Decentralized access control with anonymous authentication of data stored in clouds[J]. IEEE Transactions on Parallel & Distributed Systems, 2013,25(2): 384-394. |
[56] | WANG Z , SHA K , LV W . Slight homomorphic signature for access controlling in cloud computing[J]. Wireless Personal Communications, 2013,73(1): 51-61. |
[57] | KIM J M , MOON J K . Secure authentication system for hybrid cloud service in mobile communication environments[J]. International Journal of Distributed Sensor Networks, 2014(1): 1-7. |
[58] | CHOI C , CHOI J , KIM P . Ontology-based access control model for security policy reasoning in cloud computing[J]. Journal of Supercomputing, 2014,67(3): 711-722. |
[59] | XIAO M , WANG M , LIU X ,et al. Efficient distributed access control for big data in clouds[C]// 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Mar 25-30,2012,Orlando,FL,USA. Piscataway:IEEE Press, 2015: 202-207. |
[60] | GARRISON W C , SHULL A , MYERS S ,et al. On the practicality of cryptographically enforcing dynamic access control policies in the cloud[C]// 2016 IEEE Symposium on Security and Privacy (SP),May 23-25,2016,San Jose,CA,USA. Piscataway:IEEE Press, 2016: 819-838. |
[61] | YU Z , MAN H A , XU Q ,et al. Towards leakage-resilient fine-grained access control in fog computing[J]. Future Generation Computer Systems, 2018:78(1): 763-777. |
[62] | FAN K , WANG J , WANG X ,et al. A secure and verifiable outsourced access control scheme in fog-cloud computing[J]. Sensors, 2017,17(7)1695. |
[63] | 姜伟, 方滨兴, 山志宏 ,等. 基于攻防博弈模型的网络安全测评和最主动防御[J]. 计算机学报, 2009,32(4): 817-827. JIANG W , FANG B X , SHAN Z H ,et al. Evaluating network security and optimal active defense based on attack-defense game model[J]. Chinese Journal of Computers, 2009,32(4): 817-827. |
[64] | POOLSAPPASIT N , DEWRI R , RAY I . Dynamic security risk management using bayesian attack graphs[J]. IEEE Transactions on Dependable & Secure Computing, 2011,9(1): 61-74. |
[65] | HUANG X , GAO J , BULDYREV S V ,et al. Robustness of interdependent networks under targeted attack[J]. Physical Review E, 2011,83(6):065101. |
[66] | GAO C , LIU J , ZHONG N . Network immunization and virus propagation in email networks:experimental evaluation and analysis[J]. Knowledge and Information Systems, 2011,27(2): 253-279. |
[67] | KHOUZANI M H R , SARKAR S , ALTMAN E . Maximum damage malware attack in mobile wireless networks[J]. IEEE/ACM Transactions on Networking (TON), 2012,20(5): 1347-1360. |
[68] | 吴金宇 . 网络安全风险评估关键技术研究[D]. 北京:北京邮电大学, 2013. WU J Y . Research on key technology of network security risk assessment[D]. Beijing:Beijing University of Posts and Telecommunications, 2013. |
[69] | SUN Y , XIONG W , YAO Z ,et al. Network defense strategy selection with reinforcement learning and pareto optimization[J]. Applied Sciences, 2017,7(11):1138. |
[70] | MIAO L , LI S . Cyber security based on mean field game model of the defender:attacker strategies[J]. International Journal of Distributed Sensor Networks, 2017,13(10):155014771773790 |
[71] | JEONG I R , LEE D H . Key agreement for key hypergraph[J]. Computers & Security, 2007,26(7): 452-458. |
[72] | LO J W , HWANG M S , LIU C H . An efficient key assignment scheme for access control in a large leaf class hierarchy[J]. Information Sciences, 2011,181(4): 917-925 |
[73] | DING Y , ZHOU X , CHENG Z ,et al. Secure group communications using key hypergraphs[J]. Journal of Computational Information Systems, 2012,8(12): 5035-5042. |
[74] | RAZA S , VOIGT T , JUTVIK V.Lightweight IKEv2:a key management solution for both the compressed IPsec and the IEEE 802.15.4 security . IETF/IAB workshop on smart object security[EB].2012.--> 2012. |
[75] | ODELU V , DAS A K , GOSWAMI A . A secure effective key management scheme for dynamic access control in a large leaf class hierarchy[J]. Information Sciences, 2014,269(4): 270-285. |
[76] | SCIANCALEPORE S , CAPOSSELE A , PIRO G ,et al. Key management protocol with implicit certificates for IoT systems[C]// The 2015 Workshop on IoT Challenges in Mobile and Industrial Systems,May 18,2015,Florence,Italy. New York:ACM Press, 2015. |
[77] | IBRAHIM M . Octopus:an edge-fog mutual authentication scheme[J]. International Journal of Network Security, 2016,18(6): 1089-1101. |
[78] | ANZANI M , JAVADI H H S , MODIRIR V . Key- management scheme for wireless sensor networks based on merging blocks of symmetric design[J]. Wireless Networks, 2017(1): 1-13. |
[79] | DAGHIGHI B , KIAH M L M , IQBAL S ,et al. Host mobility key management in dynamic secure group communication[J]. Wireless Networks, 2017(1): 1-19. |
[80] | 李治 . 雾计算环境下数据安全关键技术研究[D]. 北京:北京科技大学, 2017. LI Z . Research on key technology of data security in fog computing environment[D]. Beijing:University of Science and Technology Beijing, 2017. |
[81] | 王笑帝, 张云勇, 刘镝 ,等. 云计算虚拟化安全技术研究[J]. 电信科学, 2015,31(6): 1-5. WANG X D , ZHANG Y Y , LIU D ,et al. Research on security of virtualization on cloud computing[J]. Telecommunications Science, 2015,31(6): 8-12,24. |
[1] | Shuling WANG, Jie SUN, Peng WANG, Aidong YANG. Resource scheduling optimization in cloud-edge collaboration [J]. Telecommunications Science, 2023, 39(2): 163-170. |
[2] | Bo GU, Ting AO. Application of MEC-based positioning technology in the Internet of vehicles [J]. Telecommunications Science, 2022, 38(Z1): 250-258. |
[3] | Yusun FU, Jinhui TANG. A survey on 5G capabilities enabling the factories of the future [J]. Telecommunications Science, 2022, 38(9): 18-35. |
[4] | Wenjuan XING, Bo LEI, Qianying ZHAO. Development status and trend prospect of computing power infrastructure [J]. Telecommunications Science, 2022, 38(6): 51-61. |
[5] | Pingke DENG, Tongxu ZHANG, Nanxiang SHI, Tong ZHANG, Tianzhu SHAO, Shaowen ZHENG. Computing satellite networks—the novel development of computing-empowered space-air-ground integrated networks [J]. Telecommunications Science, 2022, 38(6): 71-81. |
[6] | Lushan ZOU, Xiaowen HUANG, Jingmin YANG, Yifeng ZHENG, Guanglin ZHANG, Wenjie ZHANG. Review on resources allocation and pricing methods in mobile edge computing [J]. Telecommunications Science, 2022, 38(3): 113-132. |
[7] | Ruifeng CHEN, Jun LI, Chunjie XU, Qingbo CHENG, Xiaojun LV. Application of 5G in railway smart stations [J]. Telecommunications Science, 2021, 37(7): 86-95. |
[8] | Qian SUN, Lin TIAN, Yiqing ZHOU, Chen FENG, Yuanyuan WANG, Jihua ZHOU. Resource management in sliced networks with mobile edge computing for B5G and 6G [J]. Telecommunications Science, 2021, 37(6): 55-65. |
[9] | Jianwu ZHANG, Luxin WANG, Lingfen SUN, Qianye ZHANG, Hangguan SHAN. An survey on application of artificial intelligence in 5G system [J]. Telecommunications Science, 2021, 37(5): 14-31. |
[10] | Junhui ZHAO, Danyang ZHANG, Lin HE. Analysis and prospect of communication technology in smart urban rail [J]. Telecommunications Science, 2021, 37(4): 1-13. |
[11] | Yiying ZHANG, Baoxian ZHOU, Haoyuan PANG, Jinping CAO, Tongjia ZHANG. Electric internet of things security framework and technologies for energy interconnection [J]. Telecommunications Science, 2021, 37(2): 115-124. |
[12] | Gaochang XIE, Hua LU, Qinqin TANG, Han ZHU, Chenghao LIANG, Wen WEN, Renchao XIE. Application of blockchain in urban rail traffic edge computing network [J]. Telecommunications Science, 2021, 37(10): 117-125. |
[13] | Zhiyong LIU, Zhongjiang HE, Jinglong LIU, Yilong RUAN, Zhaofang MENG. Technology research and construction scheme of unified data lake [J]. Telecommunications Science, 2021, 37(1): 121-128. |
[14] | Chengyu ZHANG, Hongwu LI, Yang QU, Jinwu WEI. 5G edge computing development and application for industrial internet [J]. Telecommunications Science, 2021, 37(1): 129-136. |
[15] | Lei MAO,Weibin WANG,Jian LUO. Research and application of MEC service continuity technology [J]. Telecommunications Science, 2020, 36(7): 34-41. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|