[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Effective Data Sharing in an Edge–Cloud Model: Security Challenges and Solutions

Published: 27 June 2024 Publication History

Abstract

The proposed protocol offers privacy-preserving authentication across several cloud platforms, flexible key management for consumer data protection, and effective user revocation. Performance evaluation demonstrates that the proposed framework supports low latency, safe unified remote access, and data privacy in the contemporary edge-enabled environment.

References

[1]
IEEE Approved Draft Standard for Edge/Fog Manageability and Orchestration, IEEE Standard, 2023.
[2]
S. W. Smith, “Securing the Internet of Things: An ongoing challenge,” Computer, vol. 53, no. 6, pp. 62–66, Jun. 2020.
[3]
S. Rani, D. Gupta, S. Garg, M. Jalilpiran, and M. S. Hossain, “Consumer electronic devices: Evolution and edge security solutions,” IEEE Consum. Electron. Mag., vol. 11, no. 2, pp. 15–20, Mar. 2022.
[4]
S. Dougherty, R. Tourani, G. Panwar, R. Vishwanathan, S. Misra, and S. Srikanteswara, “APECS: A distributed access control framework for pervasive edge computing services,” in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., Korea, 2021, pp. 1405–1420.
[5]
K. Zhang, S. Leng, Y. He, S. Maharjan, and Y. Zhang, “Cooperative content caching in 5G networks with mobile edge computing,” IEEE Wireless Commun., vol. 25, no. 3, pp. 80–87, Jun. 2018.
[6]
P. Xu, T. Jiao, Q. Wu, W. Wang, and H. Jin, “Conditional identity-based broadcast proxy re-encryption and its application to cloud email,” IEEE Trans. Comput., vol. 65, no. 1, pp. 66–79, Jan. 2016.
[7]
G. Chunpeng, Z. Liu, J. Xia, and F. Liming, “Revocable identity-based broadcast proxy re-encryption for data sharing in clouds,” IEEE Trans. Dependable Secure Comput., vol. 18, no. 3, pp. 1214–1226, May/Jun. 2021.
[8]
S. Maiti and S. Misra, “P2B: Privacy preserving identity-based broadcast proxy re-encryption,” IEEE Trans. Veh. Technol., vol. 69, no. 5, pp. 5610–5617, May 2020.
[9]
G. Pareek and B. Purushothama, “KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage,” J. Inf. Secur. Appl., vol. 63, Dec. 2021, Art. no. 103009.
[10]
X. Han, D. Tian, J. Zhou, X. Duan, Z. Sheng, and V. C. Leung, “Privacy-preserving proxy re-encryption with decentralized trust management for MEC-empowered VANETs,” IEEE Trans. Intell. Veh., vol. 8, no. 8, pp. 4105–4119, Aug. 2023.
[11]
D. Dolev and A. Yao, “On the security of public key protocols,” IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198–208, Mar. 1983.
[12]
E. Rescorla, “The Transport Layer Security (TLS) protocol version 1.3,” Tech. Rep. 8446, Aug. 2018. [Online]. Available: https://www.rfc-editor.org/info/rfc8446
[13]
A. Stambouli and L. Logrippo, “Data flow analysis from capability lists, with application to RBAC,” Inf. Process Lett., vol. 141, pp. 30–40, Jan. 2019.
[14]
A. De Caro and V. Iovino, “jPBC: Java pairing based cryptography,” in Proc. IEEE Symp. Comput. Commun., Kerkyra, Greece: IEEE, 2011, pp. 850–855.
[15]
X. Liu et al., “Collaborative edge computing with FPGA-based CNN accelerators for energy-efficient and time-aware face tracking system,” IEEE Trans. Comput. Social Syst., vol. 9, no. 1, pp. 252–266, Feb. 2022.
[16]
D. Zhang, C. Gong, T. Zhang, J. Zhang, and M. Piao, “A new algorithm of clustering AODV based on edge computing strategy in IOV,” Wireless Netw., vol. 27, no. 4, pp. 2891–2908, 2021.
[17]
L. Wang, C. Zhao, S. Yang, X. Yang, and J. McCann, “ACE: Toward application-centric, edge–cloud, collaborative intelligence,” Commun. ACM, vol. 66, no. 1, pp. 62–73, 2022.
[18]
S. K. Nukavarapu, M. Ayyat, and T. Nadeem, “ibranchy: An accelerated edge inference platform for IoT devices,” in Proc. IEEE/ACM Symp. Edge Comput., San Jose, CA, USA: IEEE, 2021, pp. 392–396.
[19]
Q. Zhang, J. Cui, H. Zhong, and L. Liu, “Toward data transmission security based on proxy broadcast re-encryption in edge collaboration,” ACM Trans. Sensor Netw., vol. 18, no. 3, pp. 1–27, 2022.
[20]
Q. Wu, T. Lai, L. Zhang, Y. Mu, and F. Rezaeibagha, “Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud,” J. Syst. Archit., vol. 129, Aug. 2022, Art. no. 102569.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Computer
Computer  Volume 57, Issue 7
July 2024
169 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 27 June 2024

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media