Survey on Edge Computing Security Baydaa Hassan Husain & Shavan Askar

Survey on Edge Computing Security

Author (s)

Baydaa Hassan Husain & Shavan Askar

Abstract

­

It’s possible to explain Edge computing (EC) as a distributed system of IT that decentralized the power of processing in which the mobile Internet of Things (IoT) computing would be allowed. In EC, data processed by local tools, computers, or servers, instead of being process and transmitted from the data center. However, with the wider capabilities of EC by increasing the network performance and reducing the latency, security challenges, and the risks will increase with data being stored and used on these devices on the edge or end of the network. This paper first provides a definition of EC and explain the reasons that led to the rapid spread of this type of computing with an explanation of the most important differences between EC and CC, in terms of the resources available for each type, processing, storage, as well as the privacy and security factor. Later, explaining the uses and benefits of this type of computing. However, the challenges are also taken into consideration, foremost among which is security. Through reviewing a number of previous researches, security challenges have been identified in four main sectors, including data privacy and security, access control, attack mitigation, and detection for anomalies Finally, choosing a set of solutions that were drawn from previous studies and contributed in reducing and limiting these challenges. Hopping this paper sheds light on Edge Computing security and paves the way for more future research.

 Keywords: Edge Computing (EC), Internet of Things (IoT), Cloud Computing, Security, distributed system of IT.

Download PDF

Title: Survey on Edge Computing Security
Author: Baydaa Hassan Husain & Shavan Askar
Journal Name: International Journal of Science and Business
Website: ijsab.com
ISSN: ISSN 2520-4750 (Online), ISSN 2521-3040 (Print)
DOI: https://doi.org/10.5281/zenodo.4496939
Media: Online
Volume: 5
Issue: 3
Acceptance Date: 01/02/2021
Date of Publication: 03/02/2021
PDF URL: https://ijsab.com/wp-content/uploads/685.pdf
Free download: Available
Page: 52-60
First Page: 52
Last Page: 60
Paper Type: Literature Review
Current Status: Published

 

Cite This Article:

Baydaa Hassan Husain & Shavan Askar (2021). Survey on Edge Computing Security. International Journal of Science and Business, 5(3), 52-60. doi: https://doi.org/ 10.5281/zenodo.4496939

Retrieved from https://ijsab.com/wp-content/uploads/685.pdf

 

About Author (s)

Baydaa Hassan Husain,  Information System Engineering, Erbil Polytechnic University, Erbil, Iraq. Email: baydaa.mei20@epu.edu.iq.

Shavan Askar (Corresponding Author), Assistant Professor, Erbil Polytechnic University, Erbil, Iraq. Email: shavan.askar@epu.edu.iq.

 

 Download PDF

DOI: https://doi.org/10.5281/zenodo.4496939

Follow us

This Post Has Been Viewed 171 Times

0Shares