4.8 Article

Smart Applications in Edge Computing: Overview on Authentication and Data Security

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 8, 期 6, 页码 4063-4080

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3019297

关键词

Edge computing; Cloud computing; Smart grids; Authentication; Data security; Smart homes; Data security; edge computing; identity authentication; smart grid; smart home; smart transportation

资金

  1. National Natural Science Foundation of China [U1708262, U1736203, 61872449]

向作者/读者索取更多资源

The overview discusses the definitions of edge computing, the architecture of smart applications based on edge computing, and the security protection requirements in the edge computing environment from the perspectives of identity authentication and data security. It reviews the latest research works and extends the discussions on the applicability of current works in the edge computing environment. Lastly, it briefly talks about the future work on authentication and data security for edge computing-based smart applications.
As a new computing paradigm, edge computing has appeared in the public field of vision recently. Owing to its advantages of low delay and fast response, edge computing has become an important assistant of cloud computing and has brought new opportunities for diverse smart applications like the smart grid, the smart home, and the smart transportation. However, the accompanying security issues, which have always been the focus of users' concern, still cannot be ignored. Therefore, we focus on the security issues in this overview. We first introduce some related definitions of edge computing and present the architecture for edge computing-based smart applications. After illustrating the smart applications, from the perspective of identity authentication and data security, we analyze the security protection requirements of these smart applications in the edge computing environment. Next, we review some state-of-the-art works on them. Furthermore, we present the extended discussions on the applicability of these current works in the edge computing environment. Finally, we briefly discuss the future work on authentication and data security of edge computing-based smart applications.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据