Abstract
Edge computing, which is performed near client, or edge computing together with could computing is expected to provide services with better efficiency than only cloud computing. Meanwhile, most of existing public-key certificate verification methods such as OCSP do not simultaneously achieve efficiency and security with an enough high level. In this paper, we propose a certificate verification method using edge computing and show that our proposed method achieves efficiency with an enough security level by evaluating it through the implementation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Davis, A., Parikh, J., Weihl, W.: EdgeComputing: extending enterprise applications to the edge of the internet. In: Proceedings of the 13th International World Wide Web Conference on Alternate Track Papers and Posters, WWW Alternate 2004, pp. 180–187 (2004)
Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680–698 (2018)
Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC5280, May 2008. https://www.ietf.org/rfc/rfc5280.txt
Santesson, S., Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP, RFC6960, June 2013. https://tools.ietf.org/html/rfc6960
Eastlake, D.: 3rd, Transport Layer Security (TLS) Extensions: Extension Definitions, RFC6066, January 2011. https://tools.ietf.org/html/rfc6066
Pettersen, Y.: The Transport Layer Security (TLS) Multiple Certificate Status Request Extension, RFC6961, June 2013. https://tools.ietf.org/html/rfc6961
Chrome Security FAQ. http://bit.ly/2wbU925
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Kitajima, S., Mambo, M. (2018). Verifying the Validity of Public Key Certificates Using Edge Computing. In: Peng, SL., Wang, SJ., Balas, V., Zhao, M. (eds) Security with Intelligent Computing and Big-data Services. SICBS 2017. Advances in Intelligent Systems and Computing, vol 733. Springer, Cham. https://doi.org/10.1007/978-3-319-76451-1_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-76451-1_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-76450-4
Online ISBN: 978-3-319-76451-1
eBook Packages: EngineeringEngineering (R0)