全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Security Implications of Edge Computing in Cloud Networks

DOI: 10.4236/jcc.2024.122003, PP. 26-46

Keywords: Edge Computing, Cloud Networks, Artificial Intelligence, Machine Learning, Cloud Security

Full-Text   Cite this paper   Add to My Lib

Abstract:

Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques.

References

[1]  Al-Dulaimy, A., Sharma, Y., Khan, M.G. and Taheri, J. (2020) Introduction to Edge Computing. In: Taheri, J. and Deng, S.G., Eds., Edge Computing: Models, Technologies and Applications, Institution of Engineering and Technology, London, 3-25.
https://doi.org/10.1049/PBPC033E_ch1
[2]  Innovationatwork (2021) Real-Life Use Cases for Edge Computing.
https://innovationatwork.ieee.org/real-life-edge-computing-use-cases/
[3]  Tabrizchi, H. and Kuchaki Rafsanjani, M. (2020) A Survey on Security Challenges in Cloud Computing: Issues, Threats, and Solutions. The Journal of Supercomputing, 76, 9493-9532.
https://doi.org/10.1007/s11227-020-03213-1
[4]  Sharma, A. (2020) Emerging Trends in Safety Issues in Cloud the Potentials of Threat Model.
https://www.researchgate.net/figure/cloud-computing-environment-and-security-ii-cloud-security-and-privacy-some-of-the-key_fig1_347813709
[5]  Abdulsalam, Y.S. and Hedabou, M. (2021) Security and Privacy in Cloud Computing: Technical Review. Future Internet, 14, 11-15.
https://doi.org/10.3390/fi14010011
[6]  Cao, K., Liu, Y., Meng, G. and Sun, Q. (2020) An Overview on Edge Computing Research. IEEE Access, 8, 85714-85728.
https://doi.org/10.1109/ACCESS.2020.2991734
[7]  Satyanarayanan, M. (2017) The Emergence of Edge Computing. Computer, 50, 30-39.
https://www.semanticscholar.org/paper/the-emergence-of-edge-computing-satyanarayanan/eca334591d85eab2ddf9d7b567a8363cb9b11f24
[8]  Duan, Q., Wang, S. and Ansari, N. (2020) Convergence of Networking and Cloud/ Edge Computing: Status, Challenges, and Opportunities. IEEE Network, 34, 148-155.
https://doi.org/10.1109/MNET.011.2000089
[9]  Nassif, A.B., Talib, M.A., Nasir, Q., Albadani, H. and Dakalbab, F.M. (2021) Machine Learning for Cloud Security: A Systematic Review. IEEE Access, 9, 20717-20735.
https://doi.org/10.1109/ACCESS.2021.3054129
[10]  Yadav, D. (2022) Different Machine Learning Models.
https://medium.com/@yadavdeepika729/different-machine-learning-models-2387575e64cd
[11]  Bhargav, A.J.S. and Manhar, A. (2020) A Review on Cryptography in Cloud Computing. International Journal of Scientific Research in Computer Science Engineering and Information Technology, 6, 225-230.
https://doi.org/10.32628/CSEIT206639
[12]  El Sibai, R., Gemayel, N., Bou Abdo, J. and Demerjian, J. (2020) A Survey on Access Control Mechanisms for Cloud Computing. Transactions on Emerging Telecommunications Technologies, 31, e3720.
https://doi.org/10.1002/ett.3720
[13]  Parast, F.K., Sindhav, C., Nikam, S., Yekta, H.I., Kent, K.B. and Hakak, S. (2022) Cloud Computing Security: A Survey of Service-Based Models. Computers & Security, 114, Article ID: 102580.
https://doi.org/10.1016/j.cose.2021.102580
[14]  Appviewx (2020) Edge Security.
https://www.appviewx.com/education-center/edge-security/
[15]  Singh, P., Acharya, B. and Chaurasiya, R.K. (2021) Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices and Sensor Networks. In: Sharma, S.K., et al., Eds., Security and Privacy Issues in IoT Devices and Sensor Networks, Elsevier, Amsterdam, 153-185.
https://doi.org/10.1016/B978-0-12-821255-4.00008-0
[16]  Bouzerzour, N.E.H., Ghazouani, S. and Slimani, Y. (2020) A Survey on the Service Interoperability in Cloud Computing: Client-Centric and Provider-Centric Perspectives. Software: Practice and Experience, 50, 1025-1060.
https://doi.org/10.1002/spe.2794
[17]  Ramalingam, C. and Mohan, P. (2021) Addressing Semantics Standards for Cloud Portability and Interoperability in a Multi-Cloud Environment. Symmetry, 13, Article 317.
https://doi.org/10.3390/sym13020317
[18]  Wang, T., Liang, Y., Shen, X., Zheng, X., Mahmood, A. and Sheng, Q.Z. (2023) Edge Computing and Sensor-Cloud: Overview, Solutions, and Directions. ACM Computing Surveys, 55, Article No. 281.
https://doi.org/10.1145/3582270
[19]  Prat, M.K. (2024) 8 Edge Computing Trends to Watch in 2024 and Beyond.
https://www.techtarget.com/searchcio/tip/Top-edge-computing-trends-to-watch-in-2020
[20]  Hua, H., Li, Y., Wang, T., Dong, N., Li, W. and Cao, J. (2023) Edge Computing with Artificial Intelligence: A Machine Learning Perspective. ACM Computing Surveys, 55, Article No. 184.
https://doi.org/10.1145/3555802
[21]  Atieh, A.T. (2021) The Next Generation Cloud Technologies: A Review on Distributed Cloud, Fog and Edge Computing and Their Opportunities and Challenges. ResearchBerg Review of Science and Technology, 1, 1-15.
[22]  Jin, W., Xu, Y., Dai, Y. and Xu, Y. (2023) Blockchain-Based Continuous Knowledge Transfer in Decentralized Edge Computing Architecture. Electronics, 12, Article 1154.
https://www.mdpi.com/2079-9292/12/5/1154
https://doi.org/10.3390/electronics12051154
[23]  Xiao, Y., Jia, Y., Liu, C., Cheng, X., Yu, J. and Lv, W. (2019) Edge Computing Security: State of the Art and Challenges. Proceedings of the IEEE, 107, 1608-1631.
https://doi.org/10.1109/JPROC.2019.2918437
[24]  Wang, S. (2019) Edge Computing: Applications, State-of-the-Art and Challenges. Advances in Networks, 7, 8-15.
https://doi.org/10.11648/j.net.20190701.12
[25]  Ning, H., Li, Y., Shi, F. and Yang, L.T. (2020) Heterogeneous Edge Computing Open Platforms and Tools for the Internet of Things. Future Generation Computer Systems, 106, 67-76.
https://doi.org/10.1016/j.future.2019.12.036
[26]  Liu, D., Yan, Z., Ding, W. and Atiquzzaman, M. (2019) A Survey on Secure Data Analytics in Edge Computing. IEEE Internet of Things Journal, 6, 4946-4967.
https://doi.org/10.1109/JIOT.2019.2897619
[27]  Zeng, X., Zhang, X., Yang, S., Shi, Z. and Chi, C. (2021) Gait-Based Implicit Authentication Using Edge Computing and Deep Learning for Mobile Devices. Sensors, 21, Article 4592.
https://www.mdpi.com/1424-8220/21/13/4592
https://doi.org/10.3390/s21134592
[28]  Alwarafy, A., Al-Thelaya, K.A., Abdallah, M., Schneider, J. and Hamdi, M. (2020) A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things. IEEE Internet of Things Journal, 8, 4004-4022.
https://doi.org/10.1109/JIOT.2020.3015432
[29]  Sun, Y., Zhang, J., Xiong, Y. and Zhu, G. (2014) Data Security and Privacy in Cloud Computing. International Journal of Distributed Sensor Networks, 10, Article ID: 190903.
https://www.semanticscholar.org/paper/data-security-and-privacy-in-cloud-computing-sun-zhang/82121318f0945ca6444586c3e13c172531085387
[30]  Sha, K., Yang, T.A., Wei, W. and Davari, S. (2020) A Survey of Edge Computing-Based Designs for IoT Security. Digital Communications and Networks, 6, 195-202.
https://doi.org/10.1016/j.dcan.2019.08.006
[31]  Mishra, S.B. and Alok, S. (2022) Handbook of Research Methodology. Educreation publishing, Delhi.
[32]  Mourão, E., Pimentel, J.F., Murta, L., Kalinowski, M., Mendes, E. and Wohlin, C. (2020) On the Performance of Hybrid Search Strategies for Systematic Literature Reviews in Software Engineering. Information and Software Technology, 123, Article ID: 106294.
https://doi.org/10.1016/j.infsof.2020.106294
[33]  Mohanan, R. (2022) What Is Edge Computing? Components, Examples, and Best Practices.
https://www.spiceworks.com/tech/edge-computing/articles/what-is-edge-computing/
[34]  Sun, Y., Lo, F.P.W. and Lo, B. (2019) Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey. IEEE Access, 7, 183339-183355.
https://doi.org/10.1109/ACCESS.2019.2960617
[35]  He, Z., Zhang, T. and Lee, R.B. (2020) Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems. IEEE Internet of Things Journal, 8, 9706-9716.
https://doi.org/10.1109/JIOT.2020.3022358
[36]  Puthal, D., Ranjan, R., Nanda, A., Nanda, P., Jayaraman, P.P. and Zomaya, A.Y. (2019) Secure Authentication and Load Balancing of Distributed Edge Datacenters. Journal of Parallel and Distributed Computing, 124, 60-69.
https://doi.org/10.1016/j.jpdc.2018.10.007
[37]  Luo, Q., Hu, S., Li, C., Li, G. and Shi, W. (2021) Resource Scheduling in Edge Computing: A Survey. IEEE Communications Surveys & Tutorials, 23, 2131-2165.
https://doi.org/10.1109/COMST.2021.3106401
[38]  Liu, H., Li, S. and Sun, W. (2020) Resource Allocation for Edge Computing without Using Cloud Center in Smart Home Environment: A Pricing Approach. Sensors, 20, Article 6545.
https://www.mdpi.com/1424-8220/20/22/6545
https://doi.org/10.3390/s20226545
[39]  Hartmann, M., Hashmi, U.S. and Imran, A. (2022) Edge Computing in Smart Health Care Systems: Review, Challenges, and Research Directions. Transactions on Emerging Telecommunications Technologies, 33, e3710.
[40]  Coppolino, L., D’Antonio, S., Mazzeo, G. and Romano, L. (2019) A Comprehensive Survey of Hardware-Assisted Security: From the Edge to the Cloud. Internet of Things, 6, Article ID: 100055.
https://doi.org/10.1016/j.iot.2019.100055
[41]  Benjamin, A. (2022) What Is System Hardening? Standards and Best Practices.
https://www.chef.io/blog/system-hardening-with-chef-for-a-secure-it-infrastructure
[42]  Qiu, T., Chi, J., Zhou, X., Ning, Z., Atiquzzaman, M. and Wu, D.O. (2020) Edge Computing in the Industrial Internet of Things: Architecture, Advances and Challenges. IEEE Communications Surveys & Tutorials, 22, 2462-2488.
https://doi.org/10.1109/COMST.2020.3009103
[43]  Ren, Y., Zhu, F., Qi, J., Wang, J. and Sangaiah, A.K. (2019) Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things. Applied Sciences, 9, Article 2058.
https://doi.org/10.3390/app9102058

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413