SECURITY CHALLENGES IN EDGE COMPUTING
DOI:
https://doi.org/10.59367/0a04qv85Keywords:
Edge Computing (EC), Internet of effects (IoT), Cloud Computing, SecurityAbstract
It's possible to explain Edge computing (EC) as a distributed system of IT that decentralized the power of processing in which the mobile Internet of effects (IoT) computing would be allowed. In EC, data reused by original tools, computers, or waiters, rather of being process and transmitted from the data center. still, with the wider capabilities of EC by adding the network performance and reducing the quiescence, security challenges, and the pitfalls will increase with data being stored and used on this bias on the edge or end of the network. This paper first provides a description of EC and explain the reasons that led to the rapid- fire spread of this type of calculating with an explanation of the most important differences between EC and CC, in terms of the coffers available for each type, processing, storehouse, as well as the sequestration and security factor. latterly, explaining the uses and benefits of this type of computing. still, the challenges are also taken into consideration, foremost among which is security. Through reviewing a number of former inquiries, security challenges have been linked in four main sectors, including data sequestration and security, access control, attack mitigation, and discovery for anomalies Eventually, choosing a set of results that were drawn from former studies and contributed in reducing and limiting these challenges. Hopping this paper sheds light on Edge Computing security and paves the way for further unborn exploration.
References
Al Majeed, S., Askar, S., Fleury, M. (2014). H.265 Codec over 4G Networks for Telemedicine System Application. UKSim-AMSS 16th International Conference on Computer Modelling and Simulation (UK), Cambridge (pp. 292-297), doi: 10.1109/UKSim.2014.59.
Alwarafy, A., Al-Thelaya, K. A., Abdallah, M., Schneider, J., & Hamdi, M. (2020). A survey on security and privacy issues in edge computing-assisted internet of things. IEEE Internet of Things Journal. Askar S., Zervas, G., Hunter, D. K., & Simeonidou, D. (2011).
Evaluation of Classified Cloning Scheme with self-similar traffic. 3rd Computer Science and Electronic Engineering Conference (CEEC), Colchester, 2011, pp. 23-28, doi: 10.1109/CEEC.2011.5995819. Askar, S. (2016).
Adaptive Load Balancing Scheme For Data Center Networks Using Software Defined Network. Journal of University of Zakho, Vol. 4(A), No.2, Pp 275-286, Askar, S. (2017).
SDN-Based Load Balancing Scheme for Fat-Tree Data Center Networks. Al-Nahrain Journal for Engineering Sciences (NJES), Vol.20, No.5, pp.1047-1056Askar, S., Zervas, G., Hunter, D. K., & Simeonidou, D. (2011).
Service differentiation for video applications over OBS networks. 16th European Conference on Networks and Optical Communications, Newcastle-Upon-Tyne, pp. 200-203. Askar, S., Zervas, G., Hunter, D. K., & Simeonidou, D. (2011).
A novel ingress node design for video streaming over optical burst switching networks. Optics Express, Vol. 19 (26), pp. 191-194 Askar, S., Zervas, G., Hunter, D. K., & Simeonidou, D. (2011).
Adaptive Classified Cloning and Aggregation Technique for Delay and Loss sensitive Applications in OBS Networks. in Optical Fiber Communication Conference/National Fiber Optic Engineers Conference 2011, OSA Technical Digest (CD) (Optical Society of America, 2011), paper OThR4. Bajic, B., Cosic, I., Katalinic, B., Moraca, S., Lazarevic, M., & Rikalovic, A. (2019).
EDGE COMPUTING VS. CLOUD COMPUTING: CHALLENGES AND OPPORTUNITIES IN INDUSTRY 4.0. Annals of DAAAM & Proceedings, 30. Bhardwaj, K., Miranda, J. C., & Gavrilovska, A. (2018).
Towards iot-ddos prevention using edge computing. Paper presented at the {USENIX} Workshop on Hot Topics in Edge Computing (HotEdge 18). Cao, K., Liu, Y., Meng, G., & Sun, Q. (2020).
An Overview on Edge Computing Research. IEEE access, 8, 85714-85728. Fares, N., Askar, S. (2016).
A Novel Semi-Symmetric Encryption Algorithm for Internet Applications. Journal of University of Duhok, Vol. 19, No. 1, pp. 1-9 Fizi, F., & Askar, S. (2016).
A novel load balancing algorithm for software defined network based datacenters. International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom), Graz, 2016, pp. 1-6, doi: 10.1109/COBCOM.2016.7593506.
Guo, S., Hu, X., Zhou, Z., Wang, X., Qi, F., & Gao, L. (2019). Trust access authentication in vehicular network based on blockchain. China Communications, 16(6), 18-30. He, H., Zheng, L.-h., Li, P., Deng, L., Huang, L., & Chen, X. (2020).
An efficient attribute-based hierarchical data access control scheme in cloud computing. Human-centric Computing and Information Sciences, 10(1), 1-19. He, T., Ciftcioglu, E. N., Wang, S., & Chan, K. S. (2017).
Location privacy in mobile edge clouds: A chaffbased approach. IEEE Journal on Selected Areas in Communications, 35(11), 2625-2636. Ioulianou, P. P., & Vassilakis, V. G. (2019).
Lowlesh Nandkishor Yadav, “Predictive Acknowledgement using TRE System to reduce cost and Bandwidth” IJRECE VOL. 7 ISSUE 1 (JANUARY- MARCH 2019) pg no 275-278.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Futuristic Innovation in Arts, Humanities and Management (IJFIAHM)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.