A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things

被引:221
作者
Alwarafy, Abdulmalik [1 ]
Al-Thelaya, Khaled A. [1 ]
Abdallah, Mohamed [1 ]
Schneider, Jens [1 ]
Hamdi, Mounir [1 ]
机构
[1] Hamad Bin Khalifa Univ, Coll Sci & Engn, Div Informat & Comp Technol, Doha, Qatar
关键词
Security; Privacy; Computer architecture; Cloud computing; Internet of Things; Edge computing; Smart devices; EC-assisted IoT; edge computing (EC); Internet of Things (IoT); privacy; security; survey; ARCHITECTURE; CLOUD; EFFICIENT; AUTHENTICATION; ALLOCATION; MECHANISM; DEVICES; SYSTEM;
D O I
10.1109/JIOT.2020.3015432
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is an innovative paradigm envisioned to provide massive applications that are now part of our daily lives. Millions of smart devices are deployed within complex networks to provide vibrant functionalities, including communications, monitoring, and controlling of critical infrastructures. However, this massive growth of IoT devices and the corresponding huge data traffic generated at the edge of the network created additional burdens on the state-of-the-art centralized cloud computing paradigm due to the bandwidth and resource scarcity. Hence, edge computing (EC) is emerging as an innovative strategy that brings data processing and storage near to the end users, leading to what is called the EC-assisted IoT. Although this paradigm provides unique features and enhanced Quality of Service (QoS), it also introduces huge risks in data security and privacy aspects. This article conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT. In particular, we first present an overview of EC-assisted IoT, including definitions, applications, architecture, advantages, and challenges. Second, we define security and privacy in the context of EC-assisted IoT. Then, we extensively discuss the major classifications of attacks in EC-assisted IoT and provide possible solutions and countermeasures along with the related research efforts. After that, we further classify some security and privacy issues as discussed in the literature based on security services and based on security objectives and functions. Finally, several open challenges and future research directions for secure EC-assisted IoT paradigm are also extensively provided.
引用
收藏
页码:4004 / 4022
页数:19
相关论文
共 99 条
[1]   Fog Computing Architecture, Evaluation, and Future Research Directions [J].
Aazam, Mohammad ;
Zeadally, Sherali ;
Harras, Khaled A. .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (05) :46-52
[2]   Mobile Edge Computing: A Survey [J].
Abbas, Nasir ;
Zhang, Yan ;
Taherkordi, Amir ;
Skeie, Tor .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :450-465
[3]  
Alakbarov R, 2019, I C APPL INF COMM TE, P245
[4]  
Aljumah A, 2018, 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC 2018), P237, DOI 10.1109/ICCCC.2018.8390464
[5]  
[Anonymous], 2016, P 17 INT C DISTR COM
[6]  
Arun C, 2018, PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), P313, DOI 10.1109/ICICT43934.2018.9034260
[7]  
Avasalcai C, 2020, FOG COMPUTING THEORY, P43
[8]  
Awad A. I, INFORMATICA, V40, P663
[9]   Generalized Cost-Aware Cloudlet Placement for Vehicular Edge Computing Systems [J].
Bhatta, Dixit ;
Mashayekhy, Lena .
11TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2019), 2019, :159-166
[10]  
Bragadeesh SA, 2019, EAI SPRINGER INNOVAT, P171, DOI 10.1007/978-3-319-99061-3_10