Survey on data security and privacy-preserving for the research of edge computing

With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve suc...

Full description

Saved in:
Bibliographic Details
Main Authors: Jiale ZHANG, Yanchao ZHAO, Bing CHEN, Feng HU, Kun ZHU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-03-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018037/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539448375869440
author Jiale ZHANG
Yanchao ZHAO
Bing CHEN
Feng HU
Kun ZHU
author_facet Jiale ZHANG
Yanchao ZHAO
Bing CHEN
Feng HU
Kun ZHU
author_sort Jiale ZHANG
collection DOAJ
description With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.,has also introduced new security problems especially the data security and privacy issues.Firstly,the background and challenges of data security and privacy-preserving in edge computing were described,and then the research architecture of data security and privacy-preserving was presented.Secondly,the key technologies of data security,access control,identity authentication and privacy-preserving were summarized.Thirdly,the recent research advancements on the data security and privacy issues that may be applied to edge computing were described in detail.Finally,some potential research points of edge computing data security and privacy-preserving were given,and the direction of future research work was pointed out.
format Article
id doaj-art-a333b3a78eca4dcc91187a73d39fa7ed
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-03-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-a333b3a78eca4dcc91187a73d39fa7ed2025-01-14T07:14:23ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-03-013912159716879Survey on data security and privacy-preserving for the research of edge computingJiale ZHANGYanchao ZHAOBing CHENFeng HUKun ZHUWith the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.,has also introduced new security problems especially the data security and privacy issues.Firstly,the background and challenges of data security and privacy-preserving in edge computing were described,and then the research architecture of data security and privacy-preserving was presented.Secondly,the key technologies of data security,access control,identity authentication and privacy-preserving were summarized.Thirdly,the recent research advancements on the data security and privacy issues that may be applied to edge computing were described in detail.Finally,some potential research points of edge computing data security and privacy-preserving were given,and the direction of future research work was pointed out.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018037/edge computinginternet of everythingdata securityaccess controlauthenticationprivacy-preserving
spellingShingle Jiale ZHANG
Yanchao ZHAO
Bing CHEN
Feng HU
Kun ZHU
Survey on data security and privacy-preserving for the research of edge computing
Tongxin xuebao
edge computing
internet of everything
data security
access control
authentication
privacy-preserving
title Survey on data security and privacy-preserving for the research of edge computing
title_full Survey on data security and privacy-preserving for the research of edge computing
title_fullStr Survey on data security and privacy-preserving for the research of edge computing
title_full_unstemmed Survey on data security and privacy-preserving for the research of edge computing
title_short Survey on data security and privacy-preserving for the research of edge computing
title_sort survey on data security and privacy preserving for the research of edge computing
topic edge computing
internet of everything
data security
access control
authentication
privacy-preserving
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018037/
work_keys_str_mv AT jialezhang surveyondatasecurityandprivacypreservingfortheresearchofedgecomputing
AT yanchaozhao surveyondatasecurityandprivacypreservingfortheresearchofedgecomputing
AT bingchen surveyondatasecurityandprivacypreservingfortheresearchofedgecomputing
AT fenghu surveyondatasecurityandprivacypreservingfortheresearchofedgecomputing
AT kunzhu surveyondatasecurityandprivacypreservingfortheresearchofedgecomputing