Securing edge computing using cryptographic schemes: a review

被引:2
|
作者
Mahato, Ganesh Kumar [1 ]
Chakraborty, Swarnendu Kumar [1 ]
机构
[1] Natl Inst Technol, Comp Sci & Engn, Papum Pare 791113, Arunachal Prade, India
关键词
Attribute based encryption; Cryptography; Edge computing; Internet of things; Homomorphic encryption; Identity based encryption; Searchable encryption; SEARCHABLE ENCRYPTION; INTERNET; THINGS; IOT;
D O I
10.1007/s11042-023-15592-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential growth and wide-area applications of the Internet of Things have garnered a lot of interest from academics and industries, thus becoming one of the most actively studied research paradigms in recent years. Internet of Things is a concept that builds an inter-connected environment where physical devices collect data from the surroundings and customize it to our requirements. It is known for its fast processing and quick response. Edge computing is a platform that performs the computations on the data supplied by the Internet of Thing devices at the network edge that leads to real-time processing. Despite its advantages, privacy protection and security challenges remain a critical concern that must be addressed. This paper aims to give a comprehensive review on cryptographic schemes used for securing edge computing. In particular, we first present a concept of edge computing in the context of IoT including architecture and advantages over cloud computing. We have explored various encryption techniques like identity-based encryption, attribute-based encryption, searchable encryption, and homomorphic encryption that secure the sensitive data before processing it at the network edge. Various parameters of each encryption technique, such as the length of the public key, private key, and ciphetext, are compared. Computational complexity of encryption and decryption is also included in our comparative study. Although many review papers focused on authentication and authorization challenges, this review on encryption techniques in context of edge security was highly needed. We have also looked at some of the other review papers and compared them to our survey to show how important it is.
引用
收藏
页码:34825 / 34848
页数:24
相关论文
共 50 条
  • [1] Securing edge computing using cryptographic schemes: a review
    Ganesh Kumar Mahato
    Swarnendu Kumar Chakraborty
    [J]. Multimedia Tools and Applications, 2024, 83 : 34825 - 34848
  • [2] Securing IOT Devices Using SDN and Edge Computing
    Aggarwal, Chaitanya
    Srivastava, Kingshuk
    [J]. PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 877 - 882
  • [3] Securing Mobile Edge Computing Using Hybrid Deep Learning Method
    Adeniyi, Olusola
    Sadiq, Ali Safaa
    Pillai, Prashant
    Aljaidi, Mohammad
    Kaiwartya, Omprakash
    Bellavista, Paolo
    [J]. COMPUTERS, 2024, 13 (01)
  • [4] Vigilia: Securing Smart Home Edge Computing
    Trimananda, Rahmadi
    Younis, Ali
    Wang, Bojun
    Xu, Bin
    Demsky, Brian
    Xu, Guoqing
    [J]. 2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 74 - 89
  • [5] Securing smart healthcare system with edge computing
    Singh, Ashish
    Chatterjee, Kakali
    [J]. COMPUTERS & SECURITY, 2021, 108
  • [6] PixelVault: Using GPUs for Securing Cryptographic Operations
    Vasiliadis, Giorgos
    Athanasopoulos, Elias
    Polychronakis, Michalis
    Ioannidis, Sotiris
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1131 - 1142
  • [7] Cryptographic Signature Scheme for Mobile Edge Computing Using DLFP Over Semiring
    Sethupathi, S.
    Manimaran, A.
    [J]. CONTEMPORARY MATHEMATICS, 2024, 5 (02): : 1823 - 1845
  • [8] A MODIFIED CRYPTOGRAPHIC APPROACH FOR SECURING DISTRIBUTED DATA STORAGE IN CLOUD COMPUTING
    Reddy, M. Rajasekhar
    Akilandeswari, R.
    Priyadarshini, S.
    Karthikeyan, B.
    Ponmani, E.
    [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKS & ADVANCES IN COMPUTATIONAL TECHNOLOGIES (NETACT), 2017, : 131 - 139
  • [9] Benchmarking Cryptographic Schemes for Securing Public Cloud Storages (Practical Experience Report)
    Contiu, Stefan
    Leblond, Emmanuel
    Reveillere, Laurent
    [J]. DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, DAIS 2017, 2017, 10320 : 163 - 176
  • [10] Cryptographic schemes using chaotic system
    Elkamshoushy, Dalia H.
    Aboulsoud, A. Khairy
    [J]. PROCEEDINGS OF THE 25TH NATIONAL RADIO SCIENCE CONFERENCE: NRSC 2008, 2008, : U505 - U510