A Conceptual Framework for Security and Privacy in Edge Computing

Author(s):  
S. A. Bragadeesh ◽  
Umamakeswari Arumugam
2021 ◽  
pp. 1591-1600
Author(s):  
Wesam Alabdallat ◽  
Omar Alhawari

Considering the speedy developments of e-services usages, countries are thriving to present better e-government services; particularly, regarding the business sector. Therefore, the matter of evaluating e-government service quality from the business perspective has become an important issue to study. This paper discussed how the business sector perceive the e-services provided by Jordanian government, which is basically derived based on the lack of literature and models addressing such issue. In this regard, this study aims to fill this existed gap. To tackle this problem, a conceptual framework of SERVQUAL questionnaire was developed and proposed. Then, the proposed model was verified and validated. The results of this paper concluded that business perceives different gaps between the actual and anticipated e-services in which the actual recorded less than the anticipated. Additionally, the gaps revealed in the developed SERVQUAL model, which included five dimensions showed, that only one element was found to be statistically insignificant and that is the Security and Privacy. Finally, the proposed model was revised and modified.


Author(s):  
Manoranjini J. ◽  
Anbuchelian S.

The rapid massive growth of IoT and the explosive increase in the data used and created in the edge networks led to several complications in the cloud technology. Edge computing is an emerging technology which is ensuring itself as a promising technology. The authors mainly focus on the security and privacy issues and their solutions. There are a lot of important features which make edge computing the most promising technology. In this chapter, they emphasize the security and privacy issues. They also discuss various architectures that enable us to ensure safe technologies and also provide an analysis on various designs that enable strong security models. Next, they make a detailed study on different cryptographic techniques and trust management systems. This study helps us to identify the pros and cons that led us to promising implementations of edge computing in the current scenario. At the end of the chapter, the authors discuss on various open research areas which could be the thrust areas for the next era.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 76541-76567 ◽  
Author(s):  
Muktar Yahuza ◽  
Mohd Yamani Idna Bin Idris ◽  
Ainuddin Wahid Bin Abdul Wahab ◽  
Anthony T. S. Ho ◽  
Suleman Khan ◽  
...  

2019 ◽  
Vol 160 ◽  
pp. 734-739 ◽  
Author(s):  
Shalin Parikh ◽  
Dharmin Dave ◽  
Reema Patel ◽  
Nishant Doshi

Sensors ◽  
2019 ◽  
Vol 19 (22) ◽  
pp. 4905 ◽  
Author(s):  
Rongxu Xu ◽  
Wenquan Jin ◽  
Dohyeun Kim

Internet of Things (IoT) devices are embedded with software, electronics, and sensors, and feature connectivity with constrained resources. They require the edge computing paradigm, with modular characteristics relying on microservices, to provide an extensible and lightweight computing framework at the edge of the network. Edge computing can relieve the burden of centralized cloud computing by performing certain operations, such as data storage and task computation, at the edge of the network. Despite the benefits of edge computing, it can lead to many challenges in terms of security and privacy issues. Thus, services that protect privacy and secure data are essential functions in edge computing. For example, the end user’s ownership and privacy information and control are separated, which can easily lead to data leakage, unauthorized data manipulation, and other data security concerns. Thus, the confidentiality and integrity of the data cannot be guaranteed and, so, more secure authentication and access mechanisms are required to ensure that the microservices are exposed only to authorized users. In this paper, we propose a microservice security agent to integrate the edge computing platform with the API gateway technology for presenting a secure authentication mechanism. The aim of this platform is to afford edge computing clients a practical application which provides user authentication and allows JSON Web Token (JWT)-based secure access to the services of edge computing. To integrate the edge computing platform with the API gateway, we implement a microservice security agent based on the open-source Kong in the EdgeX Foundry framework. Also to provide an easy-to-use approach with Kong, we implement REST APIs for generating new consumers, registering services, configuring access controls. Finally, the usability of the proposed approach is demonstrated by evaluating the round trip time (RTT). The results demonstrate the efficiency of the system and its suitability for real-world applications.


2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Ji-Ming Chen ◽  
Shi Chen ◽  
Xiang Wang ◽  
Lin Lin ◽  
Li Wang

With the rapid development of Internet of Things technology, a large amount of user information needs to be uploaded to the cloud server for computing and storage. Side-channel attacks steal the private information of other virtual machines by coresident virtual machines to bring huge security threats to edge computing. Virtual machine migration technology is currently the main way to defend against side-channel attacks. VM migration can effectively prevent attackers from realizing coresident virtual machines, thereby ensuring data security and privacy protection of edge computing based on the Internet of Things. This paper considers the relevance between application services and proposes a VM migration strategy based on service correlation. This strategy defines service relevance factors to quantify the degree of service relevance, build VM migration groups through service relevance factors, and effectively reduce communication overhead between servers during migration, design and implement the VM memory migration based on the post-copy method, effectively reduce the occurrence of page fault interruption, and improve the efficiency of VM migration.


Author(s):  
Atiqur Rahman ◽  
Guangfu Wu ◽  
Ali Md Liton

Nowadays, the masonry for environment-friendly and protected network structure designs, for example, the Internet of Things and gigantic data analytics are increasing at a faster pace compared to an earlier state. Mobile edge computing for an Internet of Things widget is information processing that is achieved at or close to the collectors of information in an Internet of Things system. Herein, we are proposing to temporarily evaluation the concepts, features, protection, and privacy applications of Internet of Things authorized mobile edge computing with its data protection view in our data-driven globe. We focus on illuminating one of kind components that need to be taken into consideration whilst creating a scalable, consistent, impenetrable and disseminated mobile edge computing structure. We also sum up the fundamental ideas regarding security threat alleviation strategies. After that, we walk around the existing challenges and opportunities in the area of mobile edge computing. In conclusion, we analyze a case study, in which a security protection mechanism can be hardened to lift out everyday jobs.


2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
Maria-Dolores Cano ◽  
Antonio Cañavate-Sanchez

The disclosure of personal and private information is one of the main challenges of the Internet of Medical Things (IoMT). Most IoMT-based services, applications, and platforms follow a common architecture where wearables or other medical devices capture data that are forwarded to the cloud. In this scenario, edge computing brings new opportunities to enhance the operation of IoMT. However, despite the benefits, the inherent characteristics of edge computing require countermeasures to address the security and privacy issues that IoMT gives rise to. The restrictions of IoT devices in terms of battery, memory, hardware resources, or computing capabilities have led to a common agreement for the use of elliptic curve cryptography (ECC) with hardware or software implementations. As an example, the elliptic curve digital signature algorithm (ECDSA) is widely used by IoT devices to compute digital signatures. On the other hand, it is well known that dual signature has been an effective method to provide consumer privacy in classic e-commerce services. This article joins both approaches. It presents a novel solution to enhanced security and the preservation of data privacy in communications between IoMT devices and the cloud via edge computing devices. While data source anonymity is achieved from the cloud perspective, integrity and origin authentication of the collected data is also provided. In addition, computational requirements and complexity are kept to a minimum.


Sign in / Sign up

Export Citation Format

Share Document