边缘计算的安全挑战与解决方法综述
作者:
基金项目:

广东白云学院校级科研重点项目(2023BYKYZ05)


Review on Security Challenges and Solutions to Edge Computing
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [43]
  • |
  • 相似文献
  • | | |
  • 文章评论
    摘要:

    相比集中式的云计算框架, 边缘计算在云中心和现场智能设备之间部署了额外的“边缘服务器”, 支持现场智能设备快速、高效地完成运算任务和事件处理. 边缘计算系统中, 现场智能设备数量庞大、边缘计算服务器繁杂, 它们存储的数据敏感和私密性要求高. 边缘计算系统的这些特点, 给网络安全防护带来困难. 解决边缘计算系统的信息和网络安全是边缘计算技术大规模产业化的关键. 而由于边缘服务器设备和现场智能设备的计算能力、网络能力和存储能力的局限, 传统的计算机网络安全技术不能完全满足要求. 分析适合边缘计算系统的联邦学习、轻量加密、混淆与虚拟位置信息、匿名身份认证等有效的敏感数据保护技术, 以及探讨人工智能和区块链等新技术在边缘计算防范恶意攻击的应用, 助力边缘计算的产业化发展.

    Abstract:

    Compared with centralized cloud computing frameworks, edge computing deploys additional “edge servers” between a cloud center and on-site intelligent devices to support those devices to quickly and efficiently complete computing tasks and event processing. In an edge computing system, there are a large number of on-site intelligent devices and heterogeneous edge computing servers. Also, stored data is sensitive and requires high privacy. These characteristics of edge computing systems make it difficult to ensure network security. Solving information and network security of edge computing systems is the key to the large-scale industrialization of edge computing technology. However, due to the limitations of computing capacity, network capacity, and storage capacity of edge server devices and on-site intelligent devices, traditional computer network security technology may not fully meet the requirements. Analyzing effective sensitive data protection technologies suitable for edge computing systems, such as federated learning, lightweight encryption, confused and virtual location information, and anonymous identity authentication, and exploring new technologies such as artificial intelligence and blockchain to prevent malicious attacks in edge computing will greatly promote the industrial development of edge computing.

    参考文献
    [1] IDC. New IDC spending guide forecasts double-digit growth for investments in edge computing. https://www.businesswire.com/news/home/20220113005169/en/New-IDC-Spending-Guide-Forecasts-Double-Digit-Growth-for-Investments-in-Edge-Computing. (2022-01-13)[2023-04-09].
    [2] Alsubhi K. A secured intrusion detection system for mobile edge computing. Applied Sciences, 2024, 14(4): 1432.
    [3] Kumar KP, Prathap BR, Thiruthuvanathan MM, et al. Secure approach to sharing digitized medical data in a cloud environment. Data Science and Management, 2024, 7(2): 108–118.
    [4] Arzovs A, Judvaitis J, Nesenbergs K, et al. Distributed learning in the IoT-edge-cloud continuum. Machine Learning and Knowledge Extraction, 2024, 6(1): 283–315.
    [5] McMahan B, Moore E, Ramage D, et al. Communication-efficient learning of deep networks from decentralized data. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics. Fort Lauderdale: PMLR, 2017. 1273–1282.
    [6] Khan LU, Pandey SR, Tran NH, et al. Federated learning for edge networks: Resource optimization and incentive mechanism. IEEE Communications Magazine, 2020, 58(10): 88–93.
    [7] Wang SQ, Tuor T, Salonidis T, et al. Adaptive federated learning in resource constrained edge computing systems. IEEE Journal on Selected Areas in Communications, 2019, 37(6): 1205–1221.
    [8] Li QB, Wen ZY, Wu ZM, et al. A survey on federated learning systems: Vision, hype and reality for data privacy and protection. IEEE Transactions on Knowledge and Data Engineering, 2023, 35(4): 3347–3366.
    [9] Nguyen DC, Ding M, Pham QV, et al. Federated learning meets blockchain in edge computing: Opportunities and challenges. IEEE Internet of Things Journal, 2021, 8(16): 12806–12825.
    [10] Dorri A, Kanhere SS, Jurdak R, et al. Blockchain for IoT security and privacy: The case study of a smart home. Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). Kona: IEEE, 2017. 618–623.
    [11] Wang CY, Wang D, Duan YH, et al. Secure and lightweight user authentication scheme for cloud-assisted Internet of Things. IEEE Transactions on Information Forensics and Security, 2023, 18: 2961–2976.
    [12] Basudan S, Lin XD, Sankaranarayanan K. A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet of Things Journal, 2017, 4(3): 772–782.
    [13] Yu L, Liu L, Pu C. Dynamic differential location privacy with personalized error bounds. Proceedings of the 24th Annual Network and Distributed System Security Symposium. San Diego: The Internet Society, 2017.
    [14] Zhou J, Cao ZF, Qin Z, et al. LPPA: Lightweight privacy-preserving authentication from efficient multi-key secure outsourced computation for location-based services in VANETs. IEEE Transactions on Information Forensics and Security, 2020, 15: 420–434.
    [15] Lo NW, Tsai JL. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(5): 1319–1328.
    [16] Yang K, Jia XH. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(9): 1717–1726.
    [17] Setitra MA, Fan MY. Detection of DDoS attacks in SDN-based VANET using optimized TabNet. Computer Standards & Interfaces, 2024, 90: 103845.
    [18] Yu S, Zhou WL, Doss R, et al. Traceback of DDoS attacks using entropy variations. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(3): 412–425.
    [19] Li RY, Li Q, Huang YC, et al. IoTEnsemble: Detection of botnet attacks on Internet of Things. Proceedings of the 27th European Symposium on Research in Computer Security. Copenhagen: Springer, 2022. 569–588.
    [20] Li RY, Li Q, Zhou JE, et al. ADRIoT: An edge-assisted anomaly detection framework against IoT-based network attacks. IEEE Internet of Things Journal, 2022, 9(13): 10576–10587.
    [21] Li HJ, Yang C, Wang LM, et al. A cooperative defense framework against application-level DDoS attacks on mobile edge computing services. IEEE Transactions on Mobile Computing, 2023, 22(1): 1–18.
    [22] He Q, Wang C, Cui GM, et al. A game-theoretical approach for mitigating edge DDoS attack. IEEE Transactions on Dependable and Secure Computing, 2022, 19(4): 2333–2348.
    [23] Zhou RT, Zeng YF, Jiao L, et al. Online and predictive coordinated cloud-edge scrubbing for DDoS mitigation. IEEE Transactions on Mobile Computing, 2024.
    [24] Vafaei N, Soleimany H, Bagheri N. Exploiting statistical effective fault attack in a blind setting. IET Information Security, 2023, 17(4): 639–646.
    [25] Roy I, Setty STV, Kilzer A, et al. Airavat: Security and privacy for MapReduce. Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation. San Jose: USENIX Association, 2010. 297–312.
    [26] Costin A. IoT/embedded vs. security: Learn from the past, apply to the present, prepare for the future. Proceedings of the 22nd Conference of Open Innovations Association FRUCT. Jyväskylä: IEEE, 2018. 412–414.
    [27] Vervier PA, Shen Y. Before toasters rise up: A view into the emerging IoT threat landscape. Proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses. Heraklion: Springer, 2018. 556–576.
    [28] Li TX, Wang XQ, Zha MM, et al. Unleashing the walking dead: Understanding cross-APP remote infections on mobile webviews. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Dallas: ACM, 2017. 829–844.
    [29] Nguyen XH, Nguyen XD, Huynh HH, et al. Realguard: A lightweight network intrusion detection system for IoT gateways. Sensors, 2022, 22(2): 432.
    [30] Vasan D, Alazab M, Wassan S, et al. IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture. Computer Networks, 2020, 171: 107138.
    [31] Mahadevappa P, Murugesan RK, Al-Amri R, et al. A secure edge computing model using machine learning and IDS to detect and isolate intruders. MethodsX, 2024, 12: 102597.
    [32] Tomkos I, Klonidis D, Pikasis E, et al. Toward the 6G network era: Opportunities and challenges. IT Professional, 2020, 22(1): 34–38.
    [33] Sattiraju R, Weinand A, Schotten HD. AI-assisted PHY technologies for 6G and beyond wireless networks. arXiv: 1908.09523, 2019.
    [34] Tramèr F, Kurakin A, Papernot N, et al. Ensemble adversarial training: Attacks and defenses. Proceedings of the 6th International Conference on Learning Representations. Vancouver: OpenReview.net, 2018.
    [35] Al-Doghman F, Moustafa N, Khalil I, et al. AI-enabled secure microservices in edge computing: Opportunities and challenges. IEEE Transactions on Services Computing, 2023, 16(2): 1485–1504.
    [36] Letaief KB, Shi YM, Lu JM, et al. Edge artificial intelligence for 6G: Vision, enabling technologies, and applications. IEEE Journal on Selected Areas in Communications, 2022, 40(1): 5–36.
    [37] Li JX, Wu JG, Chen L, et al. Blockchain-based secure key management for mobile edge computing. IEEE Transactions on Mobile Computing, 2023, 22(1): 100–114.
    [38] Gowda NC, Manvi SS, Malakreddy AB, et al. BSKM-FC: Blockchain-based secured key management in a fog computing environment. Future Generation Computer Systems, 2023, 142: 276–291.
    [39] Huang YD, Zhang JR, Duan J, et al. Resource allocation and consensus on edge blockchain in pervasive edge computing environments. Proceedings of the 39th IEEE International Conference on Distributed Computing Systems (ICDCS). Dallas: IEEE, 2019. 1476–1486.
    [40] Liao ZF, Cheng SW. RVC: A reputation and voting based blockchain consensus mechanism for edge computing-enabled IoT systems. Journal of Network and Computer Applications, 2023, 209: 103510.
    [41] Gai KK, Wu YL, Zhu LH, et al. Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet of Things Journal, 2019, 6(5): 7992–8004.
    [42] Wu QQ, Zhang R. Intelligent reflecting surface enhanced wireless network via joint active and passive beamforming. IEEE Transactions on Wireless Communications, 2019, 18(11): 5394–5409.
    [43] Xu JP, Xu AS, Chen LY, et al. Deep reinforcement learning for RIS-aided secure mobile edge computing in industrial Internet of Things. IEEE Transactions on Industrial Informatics, 2024, 20(2): 2455–2464.
    相似文献
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

温木奇,温武少.边缘计算的安全挑战与解决方法综述.计算机系统应用,2024,33(11):38-47

复制
分享
文章指标
  • 点击次数:307
  • 下载次数: 2443
  • HTML阅读次数: 938
  • 引用次数: 0
历史
  • 收稿日期:2024-05-15
  • 最后修改日期:2024-06-12
  • 在线发布日期: 2024-09-27
文章二维码
您是第11482545位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京海淀区中关村南四街4号 中科院软件园区 7号楼305房间,邮政编码:100190
电话:010-62661041 传真: Email:csa (a) iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号