ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2020, Vol. 57 ›› Issue (10): 2027-2051.doi: 10.7544/issn1000-1239.2020.20200614

Special Issue: 2020密码学与数据隐私保护研究专题

Previous Articles     Next Articles

Research Advances on Privacy Preserving in Edge Computing

Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei   

  1. (Shanghai Key Laboratory of Trustworthy Computing (East China Normal University), Shanghai 200062)
  • Online:2020-10-01
  • Supported by: 
    This work was supported by the Shanghai Natural Science Foundation (20ZR1418400), the National Natural Science Foundation of China (61632012, 61672239, U1636216), the Fundamental Research Funds for the Central Universities (40500-20104-222196), and the China Postdoctoral Science Foundation (2017M611502).

Abstract: The wide exploitation of the theory of mobile communication and big data has enabled the flourishment of the outsourced system, where resource-constrained local users delegate batch of files and time-consuming evaluation tasks to the cloud server for outsourced storage and outsourced computation. Unfortunately, one single cloud server tends to become the target of comprise attack and bring about huge delay in response to the multi-user and multi-task setting where large quantity of inputs and outputs are respectively fed to and derived from the function evaluation, owing to its long distance from local users. To address this bottleneck of outsourced system, edge computing emerges that several edge nodes located between the cloud server and users collaborate to fulfill the tasks of outsourced storage and outsourced computation, meeting the real-time requirement but incurring new challenging issues of security and privacy-preserving. This paper firstly introduces the unique network architecture and security model of edge computing. Then, the state-of-the-art works in the field of privacy preserving of edge computing are elaborated, classified, and summarized based on the cryptographic techniques of data perturbation, fully homomorphic encryption, secure multiparty computation, fully homomorphic data encapsulation mechanism and verifiability and accountability in the following three phases: privacy-preserving data aggregation, privacy-preserving outsourced computation and their applications including private set intersection, privacy-preserving machine learning, privacy-preserving image processing, biometric authentication and secure encrypted search. Finally, several open research problems in privacy-preserving edge computing are discussed with convincing solutions, which casts light on its development and applications in the future.

Key words: edge computing, privacy-preserving, secure data aggregation, secure outsourced computation, secure multiparty computation

CLC Number: