Edge-Computing Paradigm: Survey and Analysis on Security Threats

Categories: Experience DesignTechnology

Author

dinki-chitkara

Author

Dinki Chitkara

Test Engineer, Quality Assurance

View all Articles

Top Insights

Best practices for selecting a software engineering partner

Best practices for selecting a software engineering partner

SecurityDigital TransformationDevOpsCloudMedia
7 RETAIL TRENDS POWERED BY MOBILE

7 RETAIL TRENDS POWERED BY MOBILE

MobilityConsumer and RetailMedia
My Intro to the Amazing Partnership Between the US Paralympics and the Telecom Industry

My Intro to the Amazing Partnership Between the...

Experience DesignPerspectiveCommunicationsMediaTechnology
Adaptive and Intuitive Design: Disrupting Sports Broadcasting

Adaptive and Intuitive Design: Disrupting Sports Broadcasting

Experience DesignSecurityMobilityDigital TransformationCloudBig Data & AnalyticsMedia

Top Authors

Yuriy Yuzifovich

Yuriy Yuzifovich

Chief Technology Officer, AI

Richard Lett

Richard Lett

VP of Healthcare Technology

Himanshu & Dhavaleshwar

Himanshu & Dhavaleshwar

Director Building Management System & Consultant, Business Solutions & SME - Energy & Utilities

Pragya Sharma

Pragya Sharma

Trainee Software Engineer

Blog Categories

Introduction

The commencement of extensive applications of IoT devices in the world of information technology are generating massive amount of data. The deployment of various IoT devices/sensors within the complex interconnected networks give rise to raw data from sensors, processed and controlled data, decision making data providing intelligent solution etc. IoT provide a common platform (called IoT cloud) for all the networks and devices connected to those networks so that the analytics can be performed on data and valuable information can be extracted. Huge data traffic generated by IoT sensors and related processing pose an overwhelming load and cost on IoT cloud related to bandwidth, latency and resource scarcity. This in turn degrades the quality of service (QoS) and network performance. To cope with such issues, Edge Computing (EC) paradigms came into existence extending the cloud storage capacity and computational resources in near proximity to specific IoT devices. Although EC assisted IoT reduce the volume of data transition over cloud but continued with major risks associated with the security and privacy.

Moreover, the expansion of service requirement triggers the security and efficiency issues.

The need for offloading data to nearby edge nodes demands sufficient storage, lower transmission rates, and cost-effective computation. To fulfill all these services, edge
nodes are equipped with varied enabling technologies like wireless sensor networking, lightweight virtualization, and task offloading from the cloud to the
edge. All these factors contribute to lay the foundation for security threats.

This white paper intends to address:
1) Edge Architecture,
2) Edge security threats and various problems/challenges in edge computing and
3) Approaches for alleviating those issues.

Keywords-Edge Computing, Internet of Things, Cloud, IoT devices, edge devices, security threats, benefits, challenges.

  • URL copied!