4.8 Article

Smart Applications in Edge Computing: Overview on Authentication and Data Security

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 8, Issue 6, Pages 4063-4080

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3019297

Keywords

Edge computing; Cloud computing; Smart grids; Authentication; Data security; Smart homes; Data security; edge computing; identity authentication; smart grid; smart home; smart transportation

Funding

  1. National Natural Science Foundation of China [U1708262, U1736203, 61872449]

Ask authors/readers for more resources

The overview discusses the definitions of edge computing, the architecture of smart applications based on edge computing, and the security protection requirements in the edge computing environment from the perspectives of identity authentication and data security. It reviews the latest research works and extends the discussions on the applicability of current works in the edge computing environment. Lastly, it briefly talks about the future work on authentication and data security for edge computing-based smart applications.
As a new computing paradigm, edge computing has appeared in the public field of vision recently. Owing to its advantages of low delay and fast response, edge computing has become an important assistant of cloud computing and has brought new opportunities for diverse smart applications like the smart grid, the smart home, and the smart transportation. However, the accompanying security issues, which have always been the focus of users' concern, still cannot be ignored. Therefore, we focus on the security issues in this overview. We first introduce some related definitions of edge computing and present the architecture for edge computing-based smart applications. After illustrating the smart applications, from the perspective of identity authentication and data security, we analyze the security protection requirements of these smart applications in the edge computing environment. Next, we review some state-of-the-art works on them. Furthermore, we present the extended discussions on the applicability of these current works in the edge computing environment. Finally, we briefly discuss the future work on authentication and data security of edge computing-based smart applications.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available