ijsab.com logo

Survey on Edge Computing Security Baydaa Hassan Husain & Shavan Askar

Survey on Edge Computing Security

Author (s)

Baydaa Hassan Husain & Shavan Askar

Abstract

­

It’s possible to explain Edge computing (EC) as a distributed system of IT that decentralized the power of processing in which the mobile Internet of Things (IoT) computing would be allowed. In EC, data processed by local tools, computers, or servers, instead of being process and transmitted from the data center. However, with the wider capabilities of EC by increasing the network performance and reducing the latency, security challenges, and the risks will increase with data being stored and used on these devices on the edge or end of the network. This paper first provides a definition of EC and explain the reasons that led to the rapid spread of this type of computing with an explanation of the most important differences between EC and CC, in terms of the resources available for each type, processing, storage, as well as the privacy and security factor. Later, explaining the uses and benefits of this type of computing. However, the challenges are also taken into consideration, foremost among which is security. Through reviewing a number of previous researches, security challenges have been identified in four main sectors, including data privacy and security, access control, attack mitigation, and detection for anomalies Finally, choosing a set of solutions that were drawn from previous studies and contributed in reducing and limiting these challenges. Hopping this paper sheds light on Edge Computing security and paves the way for more future research.

 Keywords: Edge Computing (EC), Internet of Things (IoT), Cloud Computing, Security, distributed system of IT.

Download PDF

Title: Survey on Edge Computing Security
Author: Baydaa Hassan Husain & Shavan Askar
Journal Name: International Journal of Science and Business
Website: ijsab.com
ISSN: ISSN 2520-4750 (Online), ISSN 2521-3040 (Print)
DOI: https://doi.org/10.5281/zenodo.4496939
Media: Online
Volume: 5
Issue: 3
Acceptance Date: 01/02/2021
Date of Publication: 03/02/2021
PDF URL: https://ijsab.com/wp-content/uploads/685.pdf
Free download: Available
Page: 52-60
First Page: 52
Last Page: 60
Paper Type: Literature Review
Current Status: Published

 

Cite This Article:

Baydaa Hassan Husain & Shavan Askar (2021). Survey on Edge Computing Security. International Journal of Science and Business, 5(3), 52-60. doi: https://doi.org/ 10.5281/zenodo.4496939

Retrieved from https://ijsab.com/wp-content/uploads/685.pdf

 

About Author (s)

Baydaa Hassan Husain,  Information System Engineering, Erbil Polytechnic University, Erbil, Iraq. Email: baydaa.mei20@epu.edu.iq.

Shavan Askar (Corresponding Author), Assistant Professor, Erbil Polytechnic University, Erbil, Iraq. Email: shavan.askar@epu.edu.iq.

 

 Download PDF

DOI: https://doi.org/10.5281/zenodo.4496939

ijsab.com logo

A Comparative Study of Mobile Banking in Specific Parts of Bangladesh Md. Toukir Ahmed, Md. Niaz Imtiaz & Abdulla All Kauser

A Comparative Study of Mobile Banking in Specific Parts of Bangladesh

Author (s)

Md. Toukir Ahmed, Md. Niaz Imtiaz & Abdulla All Kauser

Abstract

With the rapid improvements of technology worldwide, systems are getting modernized and digitalized. Traditional and time-consuming systems are replaced by efficient computerized, time-saving ones. Human Computer Interaction (HCI) based approaches are paving the way for many of these efficient models and systems, making users’ life easier day by day. One of the most ancient and impactful economic systems is Banking. We also cite out some security issues regarding the transactions using mobile banking. We confine our scope within some specific parts of Bangladesh (Pabna and Chuadanga) and analyze the issues from users, bank managers and agents of this field during doing the work. We also cite out the best service offered to both users and agents by different mobile banking agencies, based on some Artificial Intelligence (AI) and machine learning techniques and also a comparison is also shown among different techniques. Moreover, an android application is also developed to show the summarization of the total work.

Keywords: Agent, Dealings, H.C.I, Mobile Banking, Security.

Download PDF

Title: A Comparative Study of Mobile Banking in Specific Parts of Bangladesh
Author:

Md. Toukir Ahmed, Md. Niaz Imtiaz & Abdulla All Kauser

Journal Name: International Journal of Science and Business
Website: ijsab.com
ISSN: ISSN 2520-4750 (Online), ISSN 2521-3040 (Print)
DOI: https://doi.org/10.5281/zenodo.3902124
Media: Online
Volume: 4
Issue: 6
Acceptance Date: 19/06/2020
Date of Publication: 20/06/2020
PDF URL: https://ijsab.com/wp-content/uploads/560.pdf
Free download: Available
Page: 129-139
First Page: 129
Last Page: 139
Paper Type: Research Paper
Current Status: Published

Cite This Article:

Md. Toukir Ahmed, Md. Niaz Imtiaz & Abdulla All Kauser (2020). A Comparative study of Mobile Banking in Specific Parts of Bangladesh. International Journal of Science and Business, 4(6), 129-139. doi: https://doi.org/ 10.5281/zenodo.3902124

Retrieved from https://ijsab.com/wp-content/uploads/560.pdf

 

About Author (s)

Md. Toukir Ahmed (Corresponding Author), Lecturer,  Dept. of Computer Science & Engineering, Pabna University of Science & Technology, Pabna, Bangladesh.

Md. Niaz Imtiaz, Assistant Professor, Dept. of Computer Science & Engineering, Pabna University of Science & Technology, Pabna, Bangladesh

Abdulla All Kauser, Student, Dept. of Computer Science & Engineering, Pabna University of Science & Technology, Pabna, Bangladesh

 

 

Download PDF

DOI: https://doi.org/10.5281/zenodo.3902124