Skip to main content

Resource Authorization Methods for Edge Computing

  • 380 Accesses

Part of the Lecture Notes in Networks and Systems book series (LNNS,volume 449)

Abstract

To realize the distribution of processing load and prompt response, the concept of edge computing is drawing attention. Under the edge computing environment, server processing is carried out on an edge node located near various devices with a communication module instead of on a central server. These edge nodes can be provided by another entity other than service providers such as network operators. The edge nodes have fewer computing resources than a central server has. Therefore, appropriate dynamic resource management is required to avoid resource exhaustion. For this purpose, authorization techniques, e.g., OAuth, can be applied. In this paper, we consider applying the OAuth protocol for a privilege delegation on edge computing. Firstly, we clarify the authentication flows differ depending on the relationship of edge computing players (edge provider, user, service provider). We then describe the unique problems of resource authorization on edge computing.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-99584-3_15
  • Chapter length: 13 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   219.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-99584-3
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   279.99
Price excludes VAT (USA)
Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.
Fig. 9.

References

  1. Echeverría, S., Lewis, G.A., Klinedinst, D., Seitz, L.: Authentication and authorization for IoT devices in disadvantaged environments. In: Proceedings IEEE WF-IoT 2019, pp. 368–373 (2019)

    Google Scholar 

  2. ETSI: Multi-access edge computing (MEC): MEC 5G integration. ETSI GR MEC 031 V2.1.1: https://www.etsi.org/deliver/etsi_gr/MEC/001_099/031/02.01.01_60/gr_MEC031v020101p.pdf (2020)

  3. Grande, E., Beltrán, M.: Edge-centric delegation of authorization for constrained devices in the Internet of Things. Comput. Commun. 160, 464–474 (2020)

    CrossRef  Google Scholar 

  4. GSMA: Operator platform concept, phase 1: Edge cloud computing (2020). https://www.gsma.com/futurenetworks/resources/operator-platform-concept-whitepaper/

  5. Hardt, D.: The OAuth 2.0 authorization framework. RFC6749 (2012): https://datatracker.ietf.org/doc/html/rfc6749

  6. Hong, C.H., Varghese, B.: Resource management in fog/edge computing: a survey on architectures, infrastructure, and algorithms using edge computing. ACM Comput. Surv. 52(5), 1–37 (2019)

    CrossRef  Google Scholar 

  7. IETF ACE Working Group: https://tools.ietf.org/wg/ace/

  8. IETF OAuth Working Group: https://tools.ietf.org/wg/oauth/

  9. Murturi, I., Avasalcai, C., Tsigkanos, C., Dustdar, S.: Edge-to-edge resource discovery using metadata replication. In: Proceedings of the IEEE ICFEC 2019, pp. 1–6 (2019)

    Google Scholar 

  10. Pradhan, M., Poltronieri, F., Tortonesi, M.: Dynamic resource discovery and management for edge computing based on SPF for HADR operations. In: Proceedings of the IEEE ICMCIS 2019, pp. 1–6 (2019)

    Google Scholar 

  11. Soni, N., Malekian, R., Thakur, A.: Edge computing in transportation: security issues and challenges. arXiv:2012.11206 (2020)

  12. Suzuki, M., et al.: Enhanced DNS support towards distributed MEC environment. ETSI White Paper No. 39 (2020)

    Google Scholar 

  13. Toczé, K., Nadjm-Tehrani, S.: A taxonomy for management and optimization of multiple resources in edge computing. Wirel. Commun. Mob. Comput. 2018, 23 (2018). https://doi.org/10.1155/2018/7476201. Article ID 7476201

    CrossRef  Google Scholar 

  14. Xiao, Y., Jia, Y., Liu, C., Cheng, X., Yu, J., Lv, W.: Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608–1631 (2019). https://doi.org/10.1109/JPROC.2019.2918437

    CrossRef  Google Scholar 

Download references

Acknowledgement

This work was supported in part by JSPS KAKENHI Grant Number JP20K23329 and JP21H03442, and University of Hyogo Special Grant for Young Researchers.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ryu Watanabe .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Watanabe, R., Kubota, A., Kurihara, J. (2022). Resource Authorization Methods for Edge Computing. In: Barolli, L., Hussain, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2022. Lecture Notes in Networks and Systems, vol 449. Springer, Cham. https://doi.org/10.1007/978-3-030-99584-3_15

Download citation