TY - JOUR
T1 - 边缘计算隐私保护研究进展
AU - Zhou, Jun
AU - Shen, Huajie
AU - Lin, Zhongyun
AU - Cao, Zhenfu
AU - Dong, Xiaolei
N1 - Publisher Copyright:
© 2020, Science Press. All right reserved.
PY - 2020/10/1
Y1 - 2020/10/1
N2 - The wide exploitation of the theory of mobile communication and big data has enabled the flourishment of the outsourced system, where resource-constrained local users delegate batch of files and time-consuming evaluation tasks to the cloud server for outsourced storage and outsourced computation. Unfortunately, one single cloud server tends to become the target of comprise attack and bring about huge delay in response to the multi-user and multi-task setting where large quantity of inputs and outputs are respectively fed to and derived from the function evaluation, owing to its long distance from local users. To address this bottleneck of outsourced system, edge computing emerges that several edge nodes located between the cloud server and users collaborate to fulfill the tasks of outsourced storage and outsourced computation, meeting the real-time requirement but incurring new challenging issues of security and privacy-preserving. This paper firstly introduces the unique network architecture and security model of edge computing. Then, the state-of-the-art works in the field of privacy preserving of edge computing are elaborated, classified, and summarized based on the cryptographic techniques of data perturbation, fully homomorphic encryption, secure multiparty computation, fully homomorphic data encapsulation mechanism and verifiability and accountability in the following three phases: privacy-preserving data aggregation, privacy-preserving outsourced computation and their applications including private set intersection, privacy-preserving machine learning, privacy-preserving image processing, biometric authentication and secure encrypted search. Finally, several open research problems in privacy-preserving edge computing are discussed with convincing solutions, which casts light on its development and applications in the future.
AB - The wide exploitation of the theory of mobile communication and big data has enabled the flourishment of the outsourced system, where resource-constrained local users delegate batch of files and time-consuming evaluation tasks to the cloud server for outsourced storage and outsourced computation. Unfortunately, one single cloud server tends to become the target of comprise attack and bring about huge delay in response to the multi-user and multi-task setting where large quantity of inputs and outputs are respectively fed to and derived from the function evaluation, owing to its long distance from local users. To address this bottleneck of outsourced system, edge computing emerges that several edge nodes located between the cloud server and users collaborate to fulfill the tasks of outsourced storage and outsourced computation, meeting the real-time requirement but incurring new challenging issues of security and privacy-preserving. This paper firstly introduces the unique network architecture and security model of edge computing. Then, the state-of-the-art works in the field of privacy preserving of edge computing are elaborated, classified, and summarized based on the cryptographic techniques of data perturbation, fully homomorphic encryption, secure multiparty computation, fully homomorphic data encapsulation mechanism and verifiability and accountability in the following three phases: privacy-preserving data aggregation, privacy-preserving outsourced computation and their applications including private set intersection, privacy-preserving machine learning, privacy-preserving image processing, biometric authentication and secure encrypted search. Finally, several open research problems in privacy-preserving edge computing are discussed with convincing solutions, which casts light on its development and applications in the future.
KW - Edge computing
KW - Privacy-preserving
KW - Secure data aggregation
KW - Secure multiparty computation
KW - Secure outsourced computation
UR - https://www.scopus.com/pages/publications/85092580284
U2 - 10.7544/issn1000-1239.2020.20200614
DO - 10.7544/issn1000-1239.2020.20200614
M3 - 文献综述
AN - SCOPUS:85092580284
SN - 1000-1239
VL - 57
SP - 2027
EP - 2051
JO - Jisuanji Yanjiu yu Fazhan/Computer Research and Development
JF - Jisuanji Yanjiu yu Fazhan/Computer Research and Development
IS - 10
ER -