Skip to main content

An Industrial-Grade API Secure Access Gateway in the Cloud-Edge Integration Scenario

  • Conference paper
  • First Online:
Smart Grid and Internet of Things (SGIoT 2020)

Abstract

In recent years, the Internet of Things technology has developed rapidly. Due to the large number of devices at the edge, the wide distribution range, and the complex environment, cloud computing and edge computing failed to fully consider security risks at the beginning of the combination, and traditional protection methods can no longer fully meet their security requirements. The establishment of a new cloud-edge integrated security system is of great significance for ensuring the data and privacy of Internet users. This article first investigates the current status of traditional network security and analyzes its inherent shortcomings, and analyzes the organizational structure and main advantages of the zero-trust network. Designed a security certification system that meets the needs of cloud-edge integrated applications. The API security access gateway part of the system is designed and implemented. According to the type of client access request, it is equipped with multiple authentication methods. It also realized the functions of reverse proxy, load balancing, flow control, log audit, analysis and monitoring of microservices, and finally developed a supporting UI management tool based on Vue. This design provides a new set of secure access solutions for clients and microservices, which has produced good industrial benefits. It is of great significance to promote the development and popularization of cloud-edge integration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shi, W., Sun, H., Cao, J., et al.: Edge computing: a new computing model in the internet of everything era. Comput. Res. Dev. 54(5), 907–924 (2017)

    Google Scholar 

  2. Satyanarayanan, M.: The emergence of edge computing. Computer 50(1), 30–39 (2017)

    Article  Google Scholar 

  3. Enqing, X., Enran, D.: Exploration and practice of collaborative development of cloud computing and edge computing. Commun. World 801(09), 48–49 (2019)

    Google Scholar 

  4. Lu, X.: Research on task migration and resource management of mobile edge computing (2019)

    Google Scholar 

  5. Yong, S., Xiaofeng, L.: Cloud-edge integrated edge computing products help enterprises’ digital transformation. Shanghai Inf. Technol. 10, 59–61 (2018)

    Google Scholar 

  6. Zhang, J.: Overview of cloud computing platform security technology patents. Information and Computer: Theoretical Edition 000(011), pp. 126–129 (2015)

    Google Scholar 

  7. Yingnan, Z.: Zero-trust architecture: a new paradigm for network security. Financ. Electron. 11, 50–51 (2018)

    Google Scholar 

  8. Zhang, Q.: SAB-IABS: a design of an anonymous two-way identity authentication system for interconnected clouds based on secure active bundles (2014)

    Google Scholar 

  9. Zhang, J.: Research on improved trusted network connection based on behavior analysis (2017)

    Google Scholar 

  10. Ni, J., Lin, X., Shen, X.: Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J. Sel. Areas Commun., 1 (2018)

    Google Scholar 

  11. Jiang, S.: Research and implementation of cloud integrated security solutions (2015)

    Google Scholar 

  12. Mukherjee, M., Matam, R., Shu, L., et al.: Security and privacy in fog computing: challenges. IEEE Access 5, 19293–19304 (2017)

    Article  Google Scholar 

  13. Pang, H.H., Tan, K.-L.: Authenticating query results in edge computing. In: Proceedings. 20th International Conference on Data Engineering. IEEE (2004)

    Google Scholar 

  14. Zhu, L., Li, M., Zhang, Z., et al.: Privacy-preserving authentication and data aggregation for fog-based smart grid. IEEE Commun. Mag. 57, 80–85 (2019)

    Google Scholar 

  15. Botta, A., Donato, W.D., Persico, V., et al.: Integration of Cloud computing and Internet of Things: A survey. Future Gener. Comput. Syst. 56(MAR), 684–700 (2016)

    Google Scholar 

  16. Gope, P.: LAAP: lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm. Comput. Secur. 86, 223–237 (2019)

    Google Scholar 

  17. Morabito, R., Petrolo, R., Loscrì, V., et al.: LEGIoT: a lightweight edge gateway for the Internet of Things. Future Gener. Comput. Syst. 81, 1157–1171 (2017)

    Google Scholar 

  18. Wang, S., Zhang, X., Zhang, Y., et al.: A survey on mobile edge networks: convergence of computing, caching and communications. IEEE Access, PP(99), 1 (2017)

    Google Scholar 

  19. Guoqiang, S., Yanming, C., Chao, Z., et al.: Design and implementation of a smart IoT gateway. Green Computing & Communications. IEEE (2013)

    Google Scholar 

Download references

Acknowledgments

The ideas in this article come from discussions and research collaborations with two people: Zhigang Xiong and Jianjun Zeng. I would also like to thank the following people who provided valuable feedback on the design of this article and helped improve it: Quancheng Zhao, Lulu Zhao and the anonymous reviewers. This work was supported by the National Key Research and Development Program of China (grant number 2018YFC0831304) and the National Natural Science Foundation (Grant number 61772064).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sai Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, S., Zhang, ZJ., Cui, Y., Zhang, Y. (2021). An Industrial-Grade API Secure Access Gateway in the Cloud-Edge Integration Scenario. In: Lin, YB., Deng, DJ. (eds) Smart Grid and Internet of Things. SGIoT 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 354. Springer, Cham. https://doi.org/10.1007/978-3-030-69514-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-69514-9_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-69513-2

  • Online ISBN: 978-3-030-69514-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics