Edge Computing for IoT: Novel Insights from a Comparative Analysis of Access Control Models

Tao Xue,Ying Zhang,Yanbin Wang,Wenbo Wang,Shuailou Li,Haibin Zhang
2024-09-09
Abstract:IoT edge computing positions computing resources closer to the data sources to reduce the latency, relieve the bandwidth pressure on the cloud, and enhance data security. Nevertheless, data security in IoT edge computing still faces critical threats (e.g., data breaches). Access control is fundamental for mitigating these threats. However, IoT edge computing introduces notable challenges for achieving resource-conserving, low-latency, flexible, and scalable access control. To review recent access control measures, we novelly organize them according to different data lifecycles--data collection, storage, and usage--and, meanwhile, review blockchain technology in this novel organization. In this way, we provide novel insights and envisage several potential research directions. This survey can help readers find gaps systematically and prompt the development of access control techniques in IoT edge computing under the intricacy of innovations in access control.
Systems and Control
What problem does this paper attempt to address?