Edge Computing pp 173-186 | Cite as

A Conceptual Framework for Security and Privacy in Edge Computing

  • S. A. Bragadeesh
  • Umamakeswari Arumugam
Part of the EAI/Springer Innovations in Communication and Computing book series (EAISICC)


In the previous decade, Internet of Things (IoT) has paved ways for connecting devices, people, infrastructure, and practically any entity that can be connected. Cloud infrastructure has been the irrefutable part of IoT solutions with substantiated claims of resource provisioning, scalable platforms, and minimal infrastructure costs. Cloud computing does not argue well with applications that require reduced latency, positioning capabilities, and support for mobility. In such instances, edge computing can be used to compliment the cloud infrastructure and help in mitigating the various technical bottlenecks that are part of cloud services. In IoT environment, edge computing can help in improving energy efficiency, optimal resource utilization, and contextual data processing and in reducing the network traffic of backbone networks. The characteristics of edge computing may lead to new challenges for ensuring security and privacy. This chapter proposes a conceptual framework which consists of the essential components to ensure security and privacy for edge computing applications.


Edge computing Security Privacy 



The authors wish to express their sincere thanks to the Department of Science & Technology, New Delhi, India (Project ID: SR/FST/ETI-371/2014), and express their sincere thanks to the INSPIRE fellowship (DST/INSPIRE Fellowship/2016/IF160837) for their financial support. The authors also thank SASTRA Deemed to be University, Thanjavur, India, for extending the infrastructural support to carry out this work.


  1. 1.
    N. Abbas et al., Mobile edge computing: a survey. IEEE IOT J. 5(1), 450–465 (2018)Google Scholar
  2. 2.
    Y. Ai, M. Peng, K. Zhang, Edge cloud computing technologies for internet of things: a primer. Digit. Commun. Netw. 4(2), 77–86 (2018)Google Scholar
  3. 3.
    F.A. Alaba et al., Internet of things security: a survey. J. Netw. Comput. Appl. 88(April), 10–28 (2017)CrossRefGoogle Scholar
  4. 4.
    A. Alrawais et al., Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 21(2), 34–42 (2017)CrossRefGoogle Scholar
  5. 5.
    A.V. Dastjerdi, R. Buyya, Fog computing: helping the internet of things realize its potential. Computer 49(8), 112–116 (2016)CrossRefGoogle Scholar
  6. 6.
    S. Khan, S. Parkinson, Y. Qin, Fog computing security: a review of current applications and security solutions. J. Cloud Comput. 6(1), 19 (2017)CrossRefGoogle Scholar
  7. 7.
    P.G. Lopez et al., Edge-centric computing: vision and challenges. ACM SIGCOMM Comput. Commun. Rev. 45(5), 37–42 (2015)CrossRefGoogle Scholar
  8. 8.
    B.A. Martin et al., OpenFog Security Requirements and Approaches, (November, 2017), pp. 1–6Google Scholar
  9. 9.
    R. Roman, J. Lopez, M. Mambo, Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Futur. Gener. Comput. Syst. 78, 680–698 (2016)CrossRefGoogle Scholar
  10. 10.
    J. Tan, R. Gandhi, P. Narasimhan, Challenges in Security and Privacy for Mobile Edge-Clouds (Parallel Data Laboratory, Carnegie Mellon University, 2013).
  11. 11.
    S. Yi, Z. Qin, Q. Li, Security and privacy issues of fog computing: A survey, in 10th International Conference on Wireless Algorithms, Systems, and Applications, ed. by K. Xu, H. Zhu (Eds), (Springer International Publishing, 2015), pp. 685–695. CrossRefGoogle Scholar
  12. 12.
    Y. Guan, J. Shao, G. Wei, M. Xie, Data security and privacy in fog computing. IEEE Netw. 99, 1–6 (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • S. A. Bragadeesh
    • 1
  • Umamakeswari Arumugam
    • 1
  1. 1.School of ComputingSASTRA Deemed to be UniversityThanjavurIndia

Personalised recommendations