Smart Applications in Edge Computing: Overview on Authentication and Data Security

Xinghua Li,Ting Chen,Qingfeng Cheng,Siqi Ma,Jianfeng Ma
DOI: https://doi.org/10.1109/jiot.2020.3019297
IF: 10.6
2021-01-01
IEEE Internet of Things Journal
Abstract:As a new computing paradigm, edge computing has appeared in the public field of vision recently. Owing to its advantages of low delay and fast response, edge computing has become an important assistant of cloud computing and has brought new opportunities for diverse smart applications like the smart grid, the smart home, and the smart transportation. However, the accompanying security issues, which have always been the focus of users’ concern, still cannot be ignored. Therefore, we focus on the security issues in this overview. We first introduce some related definitions of edge computing and present the architecture for edge computing-based smart applications. After illustrating the smart applications, from the perspective of identity authentication and data security, we analyze the security protection requirements of these smart applications in the edge computing environment. Next, we review some state-of-the-art works on them. Furthermore, we present the extended discussions on the applicability of these current works in the edge computing environment. Finally, we briefly discuss the future work on authentication and data security of edge computing-based smart applications.
What problem does this paper attempt to address?