Journal on Communications ›› 2018, Vol. 39 ›› Issue (3): 1-21.doi: 10.11959/j.issn.1000-436x.2018037

Special Issue: 边缘计算

• Special Issue on Internet of Things and Its Security •     Next Articles

Survey on data security and privacy-preserving for the research of edge computing

Jiale ZHANG,Yanchao ZHAO(),Bing CHEN,Feng HU,Kun ZHU   

  1. College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China
  • Revised:2018-02-07 Online:2018-03-01 Published:2018-04-02
  • Supported by:
    The National Natural Science Foundation of China(61672283);The National Natural Science Foundation of China(61602238);The National Key Research and Development Program of China(2017YFB0802303);The Natural Science Foundation of Jiangsu Province(BK20160805)

Abstract:

With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.,has also introduced new security problems especially the data security and privacy issues.Firstly,the background and challenges of data security and privacy-preserving in edge computing were described,and then the research architecture of data security and privacy-preserving was presented.Secondly,the key technologies of data security,access control,identity authentication and privacy-preserving were summarized.Thirdly,the recent research advancements on the data security and privacy issues that may be applied to edge computing were described in detail.Finally,some potential research points of edge computing data security and privacy-preserving were given,and the direction of future research work was pointed out.

Key words: edge computing, internet of everything, data security, access control, authentication, privacy-preserving

CLC Number: 

No Suggested Reading articles found!