Survey on data security and privacy-preserving for the research of edge computing
With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve suc...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-03-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018037/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539448375869440 |
---|---|
author | Jiale ZHANG Yanchao ZHAO Bing CHEN Feng HU Kun ZHU |
author_facet | Jiale ZHANG Yanchao ZHAO Bing CHEN Feng HU Kun ZHU |
author_sort | Jiale ZHANG |
collection | DOAJ |
description | With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.,has also introduced new security problems especially the data security and privacy issues.Firstly,the background and challenges of data security and privacy-preserving in edge computing were described,and then the research architecture of data security and privacy-preserving was presented.Secondly,the key technologies of data security,access control,identity authentication and privacy-preserving were summarized.Thirdly,the recent research advancements on the data security and privacy issues that may be applied to edge computing were described in detail.Finally,some potential research points of edge computing data security and privacy-preserving were given,and the direction of future research work was pointed out. |
format | Article |
id | doaj-art-a333b3a78eca4dcc91187a73d39fa7ed |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2018-03-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-a333b3a78eca4dcc91187a73d39fa7ed2025-01-14T07:14:23ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-03-013912159716879Survey on data security and privacy-preserving for the research of edge computingJiale ZHANGYanchao ZHAOBing CHENFeng HUKun ZHUWith the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.,has also introduced new security problems especially the data security and privacy issues.Firstly,the background and challenges of data security and privacy-preserving in edge computing were described,and then the research architecture of data security and privacy-preserving was presented.Secondly,the key technologies of data security,access control,identity authentication and privacy-preserving were summarized.Thirdly,the recent research advancements on the data security and privacy issues that may be applied to edge computing were described in detail.Finally,some potential research points of edge computing data security and privacy-preserving were given,and the direction of future research work was pointed out.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018037/edge computinginternet of everythingdata securityaccess controlauthenticationprivacy-preserving |
spellingShingle | Jiale ZHANG Yanchao ZHAO Bing CHEN Feng HU Kun ZHU Survey on data security and privacy-preserving for the research of edge computing Tongxin xuebao edge computing internet of everything data security access control authentication privacy-preserving |
title | Survey on data security and privacy-preserving for the research of edge computing |
title_full | Survey on data security and privacy-preserving for the research of edge computing |
title_fullStr | Survey on data security and privacy-preserving for the research of edge computing |
title_full_unstemmed | Survey on data security and privacy-preserving for the research of edge computing |
title_short | Survey on data security and privacy-preserving for the research of edge computing |
title_sort | survey on data security and privacy preserving for the research of edge computing |
topic | edge computing internet of everything data security access control authentication privacy-preserving |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018037/ |
work_keys_str_mv | AT jialezhang surveyondatasecurityandprivacypreservingfortheresearchofedgecomputing AT yanchaozhao surveyondatasecurityandprivacypreservingfortheresearchofedgecomputing AT bingchen surveyondatasecurityandprivacypreservingfortheresearchofedgecomputing AT fenghu surveyondatasecurityandprivacypreservingfortheresearchofedgecomputing AT kunzhu surveyondatasecurityandprivacypreservingfortheresearchofedgecomputing |