Securing edge computing using cryptographic schemes: a review

被引:2
|
作者
Mahato, Ganesh Kumar [1 ]
Chakraborty, Swarnendu Kumar [1 ]
机构
[1] Natl Inst Technol, Comp Sci & Engn, Papum Pare 791113, Arunachal Prade, India
关键词
Attribute based encryption; Cryptography; Edge computing; Internet of things; Homomorphic encryption; Identity based encryption; Searchable encryption; SEARCHABLE ENCRYPTION; INTERNET; THINGS; IOT;
D O I
10.1007/s11042-023-15592-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential growth and wide-area applications of the Internet of Things have garnered a lot of interest from academics and industries, thus becoming one of the most actively studied research paradigms in recent years. Internet of Things is a concept that builds an inter-connected environment where physical devices collect data from the surroundings and customize it to our requirements. It is known for its fast processing and quick response. Edge computing is a platform that performs the computations on the data supplied by the Internet of Thing devices at the network edge that leads to real-time processing. Despite its advantages, privacy protection and security challenges remain a critical concern that must be addressed. This paper aims to give a comprehensive review on cryptographic schemes used for securing edge computing. In particular, we first present a concept of edge computing in the context of IoT including architecture and advantages over cloud computing. We have explored various encryption techniques like identity-based encryption, attribute-based encryption, searchable encryption, and homomorphic encryption that secure the sensitive data before processing it at the network edge. Various parameters of each encryption technique, such as the length of the public key, private key, and ciphetext, are compared. Computational complexity of encryption and decryption is also included in our comparative study. Although many review papers focused on authentication and authorization challenges, this review on encryption techniques in context of edge security was highly needed. We have also looked at some of the other review papers and compared them to our survey to show how important it is.
引用
收藏
页码:34825 / 34848
页数:24
相关论文
共 50 条
  • [31] Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing
    Li, Chunhai
    Li, Xiaohuan
    Wang, Yujue
    Ding, Yong
    Zhao, Feng
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (04) : 2099 - 2114
  • [32] Encryption Schemes of Cloud Computing: A Review
    Khan, Saif Ali
    Aggarwal, R. K.
    Kulkarni, Shashidhar
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 23 - 26
  • [33] An edge computing oriented unified cryptographic key management service for financial context
    Chen, Jingjing
    Guo, Lingling
    Shi, Yulun
    Shi, Yao
    Ruan, Yi
    [J]. WIRELESS NETWORKS, 2024, 30 (05) : 4003 - 4016
  • [34] Secure computing using cryptographic assurance of execution correctness
    Pierson, LG
    Campbell, PL
    Eldridge, JM
    Robertson, PJ
    Tarman, TD
    Witzke, EL
    [J]. 38TH ANNUAL 2004 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2004, : 239 - 246
  • [35] Securing Student Data Privacy using Modified Snake and Ladder Cryptographic Algorithm
    Kunkolienker, Kamaladevi
    Kamat, Vaishnavi
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (06) : 273 - 279
  • [36] Toward a high-performance clustering algorithm for securing edge computing environments
    Laccetti, Giuliano
    Lapegna, Marco
    Montella, Raffaele
    [J]. 2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, : 820 - 825
  • [37] Secure deduplication schemes for content delivery in mobile edge computing
    Lin, Yu
    Mao, Yunlong
    Zhang, Yuan
    Zhong, Sheng
    [J]. COMPUTERS & SECURITY, 2022, 114
  • [38] cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing
    Maryam, Afifa
    Ahmed, Usman
    Aleem, Muhammad
    Lin, Jerry Chun-Wei
    Arshad Islam, Muhammad
    Iqbal, Muhammad Azhar
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [39] Cryptographic Capability Computing
    Lemay, Michael
    Rakshit, Joydeep
    Deutsch, Sergej
    Durham, David M.
    Ghosh, Santosh
    Nori, Anant
    Gaur, Jayesh
    Weiler, Andrew
    Sultana, Salmin
    Grewal, Karanvir
    Subramoney, Sreenivas
    [J]. PROCEEDINGS OF 54TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, MICRO 2021, 2021, : 253 - 267
  • [40] Securing Broker-Less Publisher/Subscriber Systems using Cryptographic Technique
    Shitole, Shilpa
    Gujar, A. D.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,