In a recent scenario of a computing environment, the Internet of Things (IoT) provides a greater impact in several applications and services. For that Edge Computing techniques are effectively incorporated, in which the sensitive data are stored on servers.As a result, edge computing allows for data storage and operation at the network's edge to emerge as optimistic advancement. Regardless, the distinctive characteristics of edge computing including real-time computing, content perception and parallel processing have introduced a number of innovative challenges in the domain of privacy preservation and data security. Edge computing provides an extension of the cloud for designing and deploying new security resolutions in the area of IoT. In this paper, a Trusted Platform Module with Ciphertext-policy attribute-based encryption technique is introduced to provide a solution to a multilayer privacy-preserving model for efficient data storage. The developed model is adaptable and has a reliable data access control mechanism. Further, the results of the experiments demonstrate that the suggested technique operates better and give 83% results in terms of storage cost, load testing, effective runtime execution, higher security, credibility, and efficiency.
K E Y W O R D Scipher text, edge computing, internet of things, multi kernel support vector machine, multilayer access control mechanism
INTRODUCTIONThe spread of 5G network architecture and Internet of Things (IoT) is hastening the appearance of unique service standards and critical domains such as smart cities, intelligent transportation, location services, Augmented Reality and so on. 1 Numerous IoT sensing devices develop enormous amounts of data from the physical world such as smartphones, smart home appliances, wearable devices and so on. The edge computing prototypes are further dedicated and effective when compared to cloud computing terminal. 2 This technique includes both data clients and data producer. The benefits of edge things for an edge client include computational offload, acquiring data, storage and processing, nominal cost, minimal communication and minimal response period. The distribution of sending and receiving assistance from edge things effects in a more increased intensity of resource consumption, imposing lesser electricity costs. While the edge computing model contains multiple advantages over the conventional cloud platform, privacy issues are arising as an impediment to the implementation of the edge computing framework. 3 In order to maintain data privacy, susceptible data from owners must be encrypted prior to being sent to edge servers. In this case, users must figure out how to explore keywords in ciphertexts among encrypted files. The secure data search issues in a broadcasted and multidomain co-occurrence edge computing framework can be described to construct a protected keyword search method in a distributed repository service standard and the expansion towards the edge computing domain is required. 4 It is very essential to have f...