• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

边缘计算环境下安全协议综述

李晓伟, 陈本辉, 杨邓奇, 伍高飞

李晓伟, 陈本辉, 杨邓奇, 伍高飞. 边缘计算环境下安全协议综述[J]. 计算机研究与发展, 2022, 59(4): 765-780. DOI: 10.7544/issn1000-1239.20210644
引用本文: 李晓伟, 陈本辉, 杨邓奇, 伍高飞. 边缘计算环境下安全协议综述[J]. 计算机研究与发展, 2022, 59(4): 765-780. DOI: 10.7544/issn1000-1239.20210644
Li Xiaowei, Chen Benhui, Yang Dengqi, Wu Gaofei. Review of Security Protocols in Edge Computing Environments[J]. Journal of Computer Research and Development, 2022, 59(4): 765-780. DOI: 10.7544/issn1000-1239.20210644
Citation: Li Xiaowei, Chen Benhui, Yang Dengqi, Wu Gaofei. Review of Security Protocols in Edge Computing Environments[J]. Journal of Computer Research and Development, 2022, 59(4): 765-780. DOI: 10.7544/issn1000-1239.20210644
李晓伟, 陈本辉, 杨邓奇, 伍高飞. 边缘计算环境下安全协议综述[J]. 计算机研究与发展, 2022, 59(4): 765-780. CSTR: 32373.14.issn1000-1239.20210644
引用本文: 李晓伟, 陈本辉, 杨邓奇, 伍高飞. 边缘计算环境下安全协议综述[J]. 计算机研究与发展, 2022, 59(4): 765-780. CSTR: 32373.14.issn1000-1239.20210644
Li Xiaowei, Chen Benhui, Yang Dengqi, Wu Gaofei. Review of Security Protocols in Edge Computing Environments[J]. Journal of Computer Research and Development, 2022, 59(4): 765-780. CSTR: 32373.14.issn1000-1239.20210644
Citation: Li Xiaowei, Chen Benhui, Yang Dengqi, Wu Gaofei. Review of Security Protocols in Edge Computing Environments[J]. Journal of Computer Research and Development, 2022, 59(4): 765-780. CSTR: 32373.14.issn1000-1239.20210644

边缘计算环境下安全协议综述

基金项目: 国家自然科学基金项目(61902049,31960119,51809026);云南省科技厅项目(2018FH001-062,2018FH001-063);广西密码学与信息安全重点实验室研究课题(GCIS202123);大理大学创新团队项目(ZKLX2020308)
详细信息
  • 中图分类号: TP309

Review of Security Protocols in Edge Computing Environments

Funds: This work was supported by the National Natural Science Foundation of China (61902049, 31960119, 51809026), the Project of Yunnan Provincial Department of Science and Technology (2018FH001-062, 2018FH001-063), the Project of Guangxi Key Laboratory of Cryptography and Information Security(GCIS202123), and the Project of Dali University Innovation Team (ZKLX2020308).
  • 摘要: 物联网的迅速普及使得数据规模以几何式上升.集中在云中心处理数据的方式逐渐出现通信时延及隐私泄露等问题.边缘计算将部分云中心业务下沉到设备边缘,使得数据处理在终端网络完成,从而实现数据快速处理.同时,由于避免了远距离通信,用户数据在本地处理,使得用户隐私数据得以安全保护.然而网络架构的改变对边缘计算环境下的安全协议又提出了新的要求.对边缘计算环境下安全协议进行分类总结有助于相关从业人员快速掌握该领域的研究进展,更有助于边缘计算安全领域的初学者快速了解安全协议在该领域中的应用方法.综述了近年来边缘计算环境下认证协议、密钥协商协议、隐私保护协议以及数据共享协议的典型研究成果,对每个安全协议进行了具体的分类、分析及总结.给出了边缘计算环境下安全协议所存在的核心问题并针对这些问题给出了具体的研究方向及建议.实现了对边缘计算环境下安全协议研究进展进行总体把握的目的.
    Abstract: The rapid popularity of the Internet of things has caused the scale of data to rise geometrically. The method of processing data concentrated in the cloud center gradually has problems such as communication delay and privacy leakage. Edge computing sinks part of the cloud center business to the edge of the device enabling data processing to be completed on the terminal network, thereby achieving rapid data processing. At the same time, as long-distance communication is avoided, user data can be transferred locally, so that user privacy data can be safely protected. However, the change of network architecture puts forward new requirements for security protocols in the edge computing environment. The classification and summary of security protocols in the edge computing environment is helpful to relevant practitioners quickly grasp the research progress in this field, and it will also help beginners in the field of edge computing security to quickly understand the application methods of security protocols in this field. The typical research results of authentication protocols, key agreement protocols, privacy-preserving protocols, and data sharing protocols in the edge computing environment are reviewed, and each kind of security protocols is specifically classified, analyzed and summarized. The core problems of security protocols in the edge computing environment are given, and specific research directions and suggestions are given for each protocol field. The purpose of overall grasp of the research progress of security protocols in the current edge computing environment is achieved.
  • 期刊类型引用(7)

    1. Ke SHANG,Weizhen HE,Shuai ZHANG. Review on Security Defense Technology Research in Edge Computing Environment. Chinese Journal of Electronics. 2024(01): 1-18 . 必应学术
    2. 郑嘉诚,何亨,陈月佳,肖天哲. 边缘计算中基于区块链的轻量级密文访问控制方案. 计算机系统应用. 2024(04): 69-81 . 百度学术
    3. 叶文慧,王金花,张文政,周宇,刘妍妍. 移动边缘计算场景下基于身份的安全认证密钥协商协议. 通信技术. 2024(04): 400-408 . 百度学术
    4. 孙剑明,赵梦鑫. 边缘计算下差分隐私的应用研究综述. 计算机科学. 2024(S1): 896-904 . 百度学术
    5. 常敬超,汤红波,游伟. 基于信誉反馈的边缘设备信任评估算法. 信息工程大学学报. 2024(04): 485-491 . 百度学术
    6. 陈珍珠,周纯毅,苏铓,高艳松,付安民. 面向机器学习的安全外包计算研究进展. 计算机研究与发展. 2023(07): 1450-1466 . 本站查看
    7. 何勇,张航宇,郭智鸿,苏桐桐,李虎,王凯乐. 基于区块链的分布式无人机数据安全模型. 计算机测量与控制. 2023(10): 153-159 . 百度学术

    其他类型引用(20)

计量
  • 文章访问数:  534
  • HTML全文浏览量:  9
  • PDF下载量:  378
  • 被引次数: 27
出版历程
  • 发布日期:  2022-03-31

目录

    /

    返回文章
    返回