检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:夏戈明[1] 虞朝栋 陈健 XIA Ge-ming;YU Chao-dong;CHEN Jian(College of Computer Science and Technology,National University of Defense Technology,Changsha 410073,China)
机构地区:[1]国防科技大学计算机学院,湖南长沙410073
出 处:《计算机工程与科学》2023年第8期1393-1404,共12页Computer Engineering & Science
摘 要:边缘计算是未来互联网的重要技术之一。边缘网络包含海量动态异构的边缘设备,其中一些边缘设备可能是恶意的,而恶意的边缘设备会破坏边缘网络内部的数据处理和传输,因此边缘计算面临着严峻的信任需求。对边缘计算中的信任问题进行了深入的调查和研究。首先,从边缘信任管理和边缘信任评估2个方向对目前的研究进行了回顾和分类;然后,重点讨论和比较了基于区块链的信任管理系统和信任评估方法;接着,进一步对边缘信任问题中的可信数据采集的路径规划、信任激励机制、协同信任评估以及边缘计算信任的应用进行了分析与讨论;最后,根据已完成的回顾和评价,探讨了边缘信任问题面临的挑战,并提出了未来研究值得努力的方向。Edge computing is one of the important technologies for the future Internet.Due to the massive dynamic and heterogeneous edge devices in the edge network,some of these edge devices may be malicious.Malicious edge devices will disrupt data processing and transmission within the edge network.With the increasing number of edge devices,edge computing faces a serious trust demand.Therefore,this paper conducts an in-depth investigation of the trust issue in edge computing.Firstly,we review and classify the current research from the perspectives of edge trust management and edge trust evaluation.Then,we discuss and analyze the trust management system based on blockchain and the trust evaluation methods.Furthermore,we also analyze and discus the path planning of trusted data collection,trust incentive mechanism,collaborative trust evaluation,and the application of edge computing trust in the edge trust issue.Finally,according to the completed review and evaluation,we explore some challenges of trust problems in edge computing and suggest the directions that are worth our research effort in the future.
分 类 号:TP391.41[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.166