Big Data Research ›› 2019, Vol. 5 ›› Issue (2): 34-52.doi: 10.11959/j.issn.2096-0271.2019012

Special Issue: 边缘计算

• TOPIC::EDGE COMPUTING • Previous Articles     Next Articles

A survey on the security technology of edge computing

Jie LING,Jiahui CHEN,Yu LUO,Siliang ZHANG   

  1. School of Computers,Guangdong University of Technology,Guangzhou 510006,China
  • Online:2019-03-15 Published:2019-04-04
  • Supported by:
    The National Natural Science Foundation of China(61702112);Science and Technology Project of Guangzhou(201802010043);Science and Technology Project of Guangzhou(201807010058)

Abstract:

With the continuous development of Internet of things applications,a large number of mobile terminal devices participate in service computing.Traditional cloud computing models cannot adapt to the rapid growth of data generated by network edge devices,and edge computing models emerge and become a research hotspot in recent years.The concept of edge computing and the reference model of edge computing in the Internet of things were introduced,the vulnerabilities of edge devices and the main research results of cryptographic security technology in edge computing were summarized,and that symmetric cryptography technology is not suitable for communication between edge devices,and identity-based cryptography technology is more suitable for communication between edge devices and edge devices was pointed out.Paired-based cryptography is more suitable for the communication between edge devices and base stations.The application of two post-quantum cryptography technologies in edge devices was discussed.Finally,some suggestions on the research of edge computing security technology were put forward.

Key words: edge computing, Internet of things, edge device, cloud computing, cryptography technology

CLC Number: 

No Suggested Reading articles found!