期刊文献+

边缘计算安全与隐私保护研究进展 被引量:5

Research progress of edge computing security and privacy-preserving
下载PDF
导出
摘要 物联网、5G等信息技术的快速发展加速了万物互联时代的到来,网络边缘设备的爆发式增长产生了海量级边缘数据,传统云计算模型的集中式大数据处理已无法满足对边缘设备海量数据的高效处理。边缘计算作为一种新型计算模型,在更靠近用户的网络边缘侧就近提供服务,减缓了网络负载,增强了响应能力,但同时由于边缘环境的开放性、多源异构性、边缘节点资源受限等特性,使得边缘计算的安全与隐私保护面临诸多挑战。首先从安全需求出发,围绕身份认证、通信安全协议、入侵检测以及隐私保护等关键技术,系统阐述和分析了边缘计算安全与隐私保护领域的国内外研究成果,最后提出了未来可能的研究方向。 The rapid development of information technologies such as the Internet of Things and 5G accelerates the arrival of the era of the Internet of Everything,the explosive growth of network edge devices has produced massive edge data,the centralized big data processing of the traditional cloud computing model has been unable to meet the efficient processing of massive data of edge devices,therefore,edge computing comes into being at the right time.As a new computing model,edge computing provides services closer to the user′s network edge side,which reduces the network load and enhances the response ability.However,due to the openness and multi-source heterogeneity of the edge environment,the resources of edge nodes restriction and other characteristics make the security and privacy-preserving of edge computing faces many challenges.Firstly,the basic concept of edge computing is introduced,and then from the perspective of security requirements,focusing on the key technologies such as identity authentication,communication security protocol,intrusion detection and privacy-preserving,the research achievements in the field of edge computing security and privacy-preserving at home and abroad are systematically described and analyzed.Finally,the possible research directions in the future are proposed.
作者 沈传年 Shen Chuannian(National Computer Network Emergency Response Technical Team/Coordination Center of China@Shanghai,Shanghai 201315,China)
出处 《网络安全与数据治理》 2022年第8期41-48,共8页 CYBER SECURITY AND DATA GOVERNANCE
关键词 边缘计算 身份认证 入侵检测 隐私保护 edge computing identity authentication intrusion detection privacy-preserving
  • 相关文献

参考文献9

二级参考文献156

  • 1孙知信,李清东.路由器端防范DDos攻击机制综述[J].南京邮电大学学报(自然科学版),2007,27(1):89-96. 被引量:8
  • 2李金明,王汝传.基于VTP方法的DDoS攻击实时检测技术研究[J].电子学报,2007,35(4):791-796. 被引量:18
  • 3Worldwide Infrastructure Security Report,Volume Ⅲ[OL].Arbor Networks,http://www.arbornetworks.com/report,September 2007.
  • 4Dittrich D.Distributed Denial of Service(DDoS) Attacks/tools[OL].http://staff.washington.edu/dittricb/misc/ddos/.
  • 5Kargl F,Maier J,Weber M.Protecting web servers from distributed denial of service attacks[A].In Proc.International Conference on World Wide Web[C].2001.
  • 6Hussain A,Heidemann J,Papadopoulos C.A framework for classifying denial of service attacks[A].In Proc.ACM SIGCOMM[C].2003.
  • 7Mirkovic J,Reiher P.A taxonomy of DDoS attack and DDoS defense mechanisms[J].ACM SIGCOMM Computer Communications Review.2004,34(2):39-53.
  • 8Carl G,Kesidis G,Brooks R R,et al.Denial-of-service attackdetection techniques[J].IEEE Internet Computing.2006,10(1):82-89.
  • 9Peng T,Leckie C,Ramamohanarao K.Survey of network-based defense mechanisms countering the DoS and DDoS problems[J].ACM Computing Surveys.2007,39(1).
  • 10Symantec Internet Security Threat Report[OL].http://www.Symantec.com/business/theme.jsp? themeid = threatreport,April 8 2008.

共引文献838

同被引文献34

引证文献5

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部