Abstract
The emergence in the field of Internet of Things and the success of the cloud providers have extended the horizon of the new technological model that is Edge computing. This technology has got the ability to handle problems such as improving the response time, increasing battery life, cost saving of the network, along with ensuring protection and privacy of the data. To manifest the idea of Edge Computing, here a detailed case study is presented starting from cloud architecture to the security issues, further extending to its security countermeasures using Homomorphic encryption. This article explores the security challenges and the smart way to handle them and ensure privacy to the data with nicely explained algorithms. The algorithms perform computation on the encrypted form without decryption of the ciphertext. This does not require the sharing of a secret key. The opportunities in the field of edge computing is also emphasize with the expectation that this paper will pique interest and encourage further study in this area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alaya, B., Laouamer, L., Msilini, N.: Homomorphic encryption systems statement. Trends and challenges. Comput. Sci. Rev. 36, 100235 (2020)
Li, J., Song, D., Chen, S., Lu, X.: A simple fully homomorphic encryption scheme available in cloud computing. In: IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, pp. 214–217 (2012)
Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)
Ai, Y., Peng, M., Zhang, K.: Edge computing technologies for Internet of Things: a primer. Digital Commun. Networks 4(2), 77–86 (2018)
Magesh, S., Indumathi, J., Radha RamMohan, S., Niveditha, V.R., Shanmuga Prabha, P.: Concepts and contributions of edge computing in Internet of Things (IoT): a survey. Int. J. Comput. Networks Appl. 7(5), 146–156 (2020)
Faisal, M., Ali, I., Khan, M.S., Kim, S.M., Kim, J.: Establishment of trust in Internet of Things by integrating trusted platform module: to counter cybersecurity challenges. Complexity (2020)
Caprolu, M., Pietro, R.D., Lombardi, F., Raponi, S.: Edge computing perspectives: architectures, technologies, and open security issues. In: IEEE International Conference on Edge Computing (EDGE) 2019, pp. 116–123 (2019)
Alwarafy, A., Al-Thelaya, K.A., Abdallah, M., Schneider, J., Hamdi, M.: A survey on security and privacy issues in edge-computing-assisted Internet of Things. IEEE Internet Things J. 8(6), 4004–4022 (2021)
Wu, H., Zhang, Z., Guan, C., Wolter, K., Xu, M.: Collaborate edge and cloud computing with distributed deep learning for smart city internet of things. IEEE Internet Things J. 7(9), 8099–8110 (2020)
Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237–248 (2014)
Murugesan, A., Saminathan, B., Al-Turjman, F., Kumar, R.L.: Analysis on homomorphic technique for data security in fog computing. Trans. Emerg. Telecommun. Technol. 1–16 (2020)
Yan, X., Wu, Q., Sun, Y.: A homomorphic encryption and privacy protection method based on blockchain and edge computing. Wirel. Commun. Mobile Comput. 2020 (2020)
Mannanuddin, K., Kumar, M.R., Aluvala, S., Nagender, Y.: Fundamental perception of EDGE computing. In: International Conference on Recent Advancements in Engineering and Management, vol. 981. Warangal, India (2020)
Parikh, S., Dave, D., Patel, R., Doshi, N.: Security and privacy issues in cloud, fog and edge computing. Proc. Comput. Sci. 160, 734–739 (2019)
Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)
Faruque, M.A., Vatanparvar, K.: Energy management-as-a-service over fog computing platform. IEEE Internet Things J. 3(2), 161–169 (2016)
Alabdulatif, A., Khalil, I., Yi, X.: Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. J. Parallel Distrib. Comput. 137, 192–204 (2019)
Lin, H., Bergmann, N.W.: IoT privacy and security challenges for smart home environments. Information 7(3), 44 (2016)
Elhassani, M., Boulbot, A., Chillali, A., Mouhib, A.: Fully homomorphic encryption scheme on a non-commutative ring R. In: International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS) 2019, pp. 1–4 (2019)
Wang, B., Zhan, Y., Zhang, Z.: Cryptanalysis of a symmetric fully homomorphic encryption scheme. IEEE Trans. Inf. Forensics Secur. 13(6), 1460–1467 (2018)
Zhang, Y.J., Shang, T., Liu, J.W., Wu, W.: Quantum homomorphic encryption based on quantum obfuscation. In: International Wireless Communications and Mobile Computing (IWCMC) 2020, pp. 2010–2015 (2020)
Morampudi, M.K., Prasad, M.V.N.K., Raju, U.S.N.: Privacy-preserving iris authentication using fully homomorphic encryption. Multimed. Tools Appl. 79, 19215–19237 (2020)
Varghese, B., Wang, N., Barbhuiya, S., Kilpatrick, P., Nikolopoulos, D.S.: Challenges and opportunities in edge computing. In: IEEE International Conference on Smart Cloud (SmartCloud) 2016, pp. 20–26 (2016)
Manzoor, A., Braeken, A., Kanhere, S.S., Ylianttila, M., Liyanage, M.: Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain. J. Network Comput. Appl. 176 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mahato, G.K., Chakraborty, S.K. (2022). Privacy Protection of Edge Computing Using Homomorphic Encryption. In: Gupta, D., Goswami, R.S., Banerjee, S., Tanveer, M., Pachori, R.B. (eds) Pattern Recognition and Data Analysis with Applications. Lecture Notes in Electrical Engineering, vol 888. Springer, Singapore. https://doi.org/10.1007/978-981-19-1520-8_31
Download citation
DOI: https://doi.org/10.1007/978-981-19-1520-8_31
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1519-2
Online ISBN: 978-981-19-1520-8
eBook Packages: Computer ScienceComputer Science (R0)