Survey on Edge Computing Security
Baydaa Hassan Husain & Shavan Askar
It’s possible to explain Edge computing (EC) as a distributed system of IT that decentralized the power of processing in which the mobile Internet of Things (IoT) computing would be allowed. In EC, data processed by local tools, computers, or servers, instead of being process and transmitted from the data center. However, with the wider capabilities of EC by increasing the network performance and reducing the latency, security challenges, and the risks will increase with data being stored and used on these devices on the edge or end of the network. This paper first provides a definition of EC and explain the reasons that led to the rapid spread of this type of computing with an explanation of the most important differences between EC and CC, in terms of the resources available for each type, processing, storage, as well as the privacy and security factor. Later, explaining the uses and benefits of this type of computing. However, the challenges are also taken into consideration, foremost among which is security. Through reviewing a number of previous researches, security challenges have been identified in four main sectors, including data privacy and security, access control, attack mitigation, and detection for anomalies Finally, choosing a set of solutions that were drawn from previous studies and contributed in reducing and limiting these challenges. Hopping this paper sheds light on Edge Computing security and paves the way for more future research.
Keywords: Edge Computing (EC), Internet of Things (IoT), Cloud Computing, Security, distributed system of IT.
|Title:||Survey on Edge Computing Security|
|Author:||Baydaa Hassan Husain & Shavan Askar|
|Journal Name:||International Journal of Science and Business|
|ISSN:||ISSN 2520-4750 (Online), ISSN 2521-3040 (Print)|
|Date of Publication:||03/02/2021|
|Paper Type:||Literature Review|
Cite This Article:
Baydaa Hassan Husain & Shavan Askar (2021). Survey on Edge Computing Security. International Journal of Science and Business, 5(3), 52-60. doi: https://doi.org/ 10.5281/zenodo.4496939
Retrieved from https://ijsab.com/wp-content/uploads/685.pdf
About Author (s)
Baydaa Hassan Husain, Information System Engineering, Erbil Polytechnic University, Erbil, Iraq. Email: firstname.lastname@example.org.
Shavan Askar (Corresponding Author), Assistant Professor, Erbil Polytechnic University, Erbil, Iraq. Email: email@example.com.