Security of Edge Computing Based on Trusted Computing

With the development of information communication technology and Internet of Things technology, the number of devices connected to the network and the amount of data generated are exponentially increasing, thus resulting in a series of new application scenarios. The traditional centralized cloud computing big data processing model can no longer content the current data growth needs. Thus, born edge computing, a new computing model that migrates some or all of the computing tasks of the original cloud computing center to near the data source, gradually received extensive attention from all walks of life. According to the current cloud computing and edge computing application scenarios, analyze some security threats faced by edge computing in applications. Analyze and organize the security part of the existing edge computing reference architecture, and refine the edge computing security protection architecture and principles. By introducing trusted computing and blockchain technology, the credibility and adaptability of the edge computing security protection system is increased, making it more adaptable to the current practical application scenarios.

[1]  Sun Chao-chao Application of Trusted Computing Technology in Cloud Computing Security , 2013 .

[2]  Tal Malkin,et al.  Secure anonymous database search , 2009, CCSW '09.

[3]  Ming Zhao,et al.  Are Existing Knowledge Transfer Techniques Effective for Deep Learning with Edge Devices? , 2018, 2018 IEEE International Conference on Edge Computing (EDGE).

[4]  Jason Crampton,et al.  On key assignment for hierarchical access control , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).

[5]  Katherine Guo,et al.  Cachier: Edge-Caching for Recognition Applications , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).