SECURITY CHALLENGES IN EDGE COMPUTING

Authors

  • Mr. Pratik Tonge Department of Computer Science & Engineering, Shri Sai College of Engineering & Technology, Chandrapur, India.
  • Mr. Neehal Jiwane Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India
  • Mr. Vijay Rakhade Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India

DOI:

https://doi.org/10.59367/0a04qv85

Keywords:

Edge Computing (EC), Internet of effects (IoT), Cloud Computing, Security

Abstract

It's possible to explain Edge computing (EC) as a distributed system of IT that decentralized the power of processing in which the mobile Internet of effects (IoT) computing would be allowed. In EC, data reused by original tools, computers, or waiters, rather of being process and transmitted from the data center. still, with the wider capabilities of EC by adding the network performance and reducing the quiescence, security challenges, and the pitfalls will increase with data being stored and used on this bias on the edge or end of the network. This paper first provides a description of EC and explain the reasons that led to the rapid- fire spread of this type of calculating with an explanation of the most important differences between EC and CC, in terms of the coffers available for each type, processing, storehouse, as well as the sequestration and security factor. latterly, explaining the uses and benefits of this type of computing. still, the challenges are also taken into consideration, foremost among which is security. Through reviewing a number of former inquiries, security challenges have been linked in four main sectors, including data sequestration and security, access control, attack mitigation, and discovery for anomalies Eventually, choosing a set of results that were drawn from former studies and contributed in reducing and limiting these challenges. Hopping this paper sheds light on Edge Computing security and paves the way for further unborn exploration.

References

Al Majeed, S., Askar, S., Fleury, M. (2014). H.265 Codec over 4G Networks for Telemedicine System Application. UKSim-AMSS 16th International Conference on Computer Modelling and Simulation (UK), Cambridge (pp. 292-297), doi: 10.1109/UKSim.2014.59.

Alwarafy, A., Al-Thelaya, K. A., Abdallah, M., Schneider, J., & Hamdi, M. (2020). A survey on security and privacy issues in edge computing-assisted internet of things. IEEE Internet of Things Journal. Askar S., Zervas, G., Hunter, D. K., & Simeonidou, D. (2011).

Evaluation of Classified Cloning Scheme with self-similar traffic. 3rd Computer Science and Electronic Engineering Conference (CEEC), Colchester, 2011, pp. 23-28, doi: 10.1109/CEEC.2011.5995819. Askar, S. (2016).

Adaptive Load Balancing Scheme For Data Center Networks Using Software Defined Network. Journal of University of Zakho, Vol. 4(A), No.2, Pp 275-286, Askar, S. (2017).

SDN-Based Load Balancing Scheme for Fat-Tree Data Center Networks. Al-Nahrain Journal for Engineering Sciences (NJES), Vol.20, No.5, pp.1047-1056Askar, S., Zervas, G., Hunter, D. K., & Simeonidou, D. (2011).

Service differentiation for video applications over OBS networks. 16th European Conference on Networks and Optical Communications, Newcastle-Upon-Tyne, pp. 200-203. Askar, S., Zervas, G., Hunter, D. K., & Simeonidou, D. (2011).

A novel ingress node design for video streaming over optical burst switching networks. Optics Express, Vol. 19 (26), pp. 191-194 Askar, S., Zervas, G., Hunter, D. K., & Simeonidou, D. (2011).

Adaptive Classified Cloning and Aggregation Technique for Delay and Loss sensitive Applications in OBS Networks. in Optical Fiber Communication Conference/National Fiber Optic Engineers Conference 2011, OSA Technical Digest (CD) (Optical Society of America, 2011), paper OThR4. Bajic, B., Cosic, I., Katalinic, B., Moraca, S., Lazarevic, M., & Rikalovic, A. (2019).

EDGE COMPUTING VS. CLOUD COMPUTING: CHALLENGES AND OPPORTUNITIES IN INDUSTRY 4.0. Annals of DAAAM & Proceedings, 30. Bhardwaj, K., Miranda, J. C., & Gavrilovska, A. (2018).

Towards iot-ddos prevention using edge computing. Paper presented at the {USENIX} Workshop on Hot Topics in Edge Computing (HotEdge 18). Cao, K., Liu, Y., Meng, G., & Sun, Q. (2020).

An Overview on Edge Computing Research. IEEE access, 8, 85714-85728. Fares, N., Askar, S. (2016).

A Novel Semi-Symmetric Encryption Algorithm for Internet Applications. Journal of University of Duhok, Vol. 19, No. 1, pp. 1-9 Fizi, F., & Askar, S. (2016).

A novel load balancing algorithm for software defined network based datacenters. International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom), Graz, 2016, pp. 1-6, doi: 10.1109/COBCOM.2016.7593506.

Guo, S., Hu, X., Zhou, Z., Wang, X., Qi, F., & Gao, L. (2019). Trust access authentication in vehicular network based on blockchain. China Communications, 16(6), 18-30. He, H., Zheng, L.-h., Li, P., Deng, L., Huang, L., & Chen, X. (2020).

An efficient attribute-based hierarchical data access control scheme in cloud computing. Human-centric Computing and Information Sciences, 10(1), 1-19. He, T., Ciftcioglu, E. N., Wang, S., & Chan, K. S. (2017).

Location privacy in mobile edge clouds: A chaffbased approach. IEEE Journal on Selected Areas in Communications, 35(11), 2625-2636. Ioulianou, P. P., & Vassilakis, V. G. (2019).

Lowlesh Nandkishor Yadav, “Predictive Acknowledgement using TRE System to reduce cost and Bandwidth” IJRECE VOL. 7 ISSUE 1 (JANUARY- MARCH 2019) pg no 275-278.

Downloads

Published

2024-03-11

Issue

Section

Articles

How to Cite

SECURITY CHALLENGES IN EDGE COMPUTING. (2024). International Journal of Futuristic Innovation in Arts, Humanities and Management (IJFIAHM), 3(1), 431-442. https://doi.org/10.59367/0a04qv85

Similar Articles

1-10 of 63

You may also start an advanced similarity search for this article.