A Conceptual Framework for Security and Privacy in Edge Computing
In the previous decade, Internet of Things (IoT) has paved ways for connecting devices, people, infrastructure, and practically any entity that can be connected. Cloud infrastructure has been the irrefutable part of IoT solutions with substantiated claims of resource provisioning, scalable platforms, and minimal infrastructure costs. Cloud computing does not argue well with applications that require reduced latency, positioning capabilities, and support for mobility. In such instances, edge computing can be used to compliment the cloud infrastructure and help in mitigating the various technical bottlenecks that are part of cloud services. In IoT environment, edge computing can help in improving energy efficiency, optimal resource utilization, and contextual data processing and in reducing the network traffic of backbone networks. The characteristics of edge computing may lead to new challenges for ensuring security and privacy. This chapter proposes a conceptual framework which consists of the essential components to ensure security and privacy for edge computing applications.
KeywordsEdge computing Security Privacy
The authors wish to express their sincere thanks to the Department of Science & Technology, New Delhi, India (Project ID: SR/FST/ETI-371/2014), and express their sincere thanks to the INSPIRE fellowship (DST/INSPIRE Fellowship/2016/IF160837) for their financial support. The authors also thank SASTRA Deemed to be University, Thanjavur, India, for extending the infrastructural support to carry out this work.
- 1.N. Abbas et al., Mobile edge computing: a survey. IEEE IOT J. 5(1), 450–465 (2018)Google Scholar
- 2.Y. Ai, M. Peng, K. Zhang, Edge cloud computing technologies for internet of things: a primer. Digit. Commun. Netw. 4(2), 77–86 (2018)Google Scholar
- 8.B.A. Martin et al., OpenFog Security Requirements and Approaches, (November, 2017), pp. 1–6Google Scholar
- 10.J. Tan, R. Gandhi, P. Narasimhan, Challenges in Security and Privacy for Mobile Edge-Clouds (Parallel Data Laboratory, Carnegie Mellon University, 2013). http://www.pdl.cmu.edu/PDL-FTP/associated/CMU-PDL-13-113.pdf
- 11.S. Yi, Z. Qin, Q. Li, Security and privacy issues of fog computing: A survey, in 10th International Conference on Wireless Algorithms, Systems, and Applications, ed. by K. Xu, H. Zhu (Eds), (Springer International Publishing, 2015), pp. 685–695. https://doi.org/10.1007/978-3-319-21837-3_67 CrossRefGoogle Scholar
- 12.Y. Guan, J. Shao, G. Wei, M. Xie, Data security and privacy in fog computing. IEEE Netw. 99, 1–6 (2018)Google Scholar