scholarly journals Enhancing Security and Privacy of Next-Generation Edge Computing Technologies

Author(s):  
Matthew Hagan ◽  
Fahad Siddiqui ◽  
Sakir Sezer
Author(s):  
Sergio Márquez-Sánchez ◽  
Jorge Herrera-Santos ◽  
Israel Campero-Jurado ◽  
Angélica González-Arrieta ◽  
Fernando de la Prieta-Pintado

Author(s):  
Manoranjini J. ◽  
Anbuchelian S.

The rapid massive growth of IoT and the explosive increase in the data used and created in the edge networks led to several complications in the cloud technology. Edge computing is an emerging technology which is ensuring itself as a promising technology. The authors mainly focus on the security and privacy issues and their solutions. There are a lot of important features which make edge computing the most promising technology. In this chapter, they emphasize the security and privacy issues. They also discuss various architectures that enable us to ensure safe technologies and also provide an analysis on various designs that enable strong security models. Next, they make a detailed study on different cryptographic techniques and trust management systems. This study helps us to identify the pros and cons that led us to promising implementations of edge computing in the current scenario. At the end of the chapter, the authors discuss on various open research areas which could be the thrust areas for the next era.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 76541-76567 ◽  
Author(s):  
Muktar Yahuza ◽  
Mohd Yamani Idna Bin Idris ◽  
Ainuddin Wahid Bin Abdul Wahab ◽  
Anthony T. S. Ho ◽  
Suleman Khan ◽  
...  

2019 ◽  
Vol 160 ◽  
pp. 734-739 ◽  
Author(s):  
Shalin Parikh ◽  
Dharmin Dave ◽  
Reema Patel ◽  
Nishant Doshi

IEEE Network ◽  
2019 ◽  
Vol 33 (6) ◽  
pp. 140-147 ◽  
Author(s):  
Ali Alnoman ◽  
Shree Krishna Sharma ◽  
Waleed Ejaz ◽  
Alagan Anpalagan

2020 ◽  
Vol 15 (7) ◽  
pp. 545-557 ◽  
Author(s):  
Chunsen Liu ◽  
Huawei Chen ◽  
Shuiyuan Wang ◽  
Qi Liu ◽  
Yu-Gang Jiang ◽  
...  

Sensors ◽  
2019 ◽  
Vol 19 (22) ◽  
pp. 4905 ◽  
Author(s):  
Rongxu Xu ◽  
Wenquan Jin ◽  
Dohyeun Kim

Internet of Things (IoT) devices are embedded with software, electronics, and sensors, and feature connectivity with constrained resources. They require the edge computing paradigm, with modular characteristics relying on microservices, to provide an extensible and lightweight computing framework at the edge of the network. Edge computing can relieve the burden of centralized cloud computing by performing certain operations, such as data storage and task computation, at the edge of the network. Despite the benefits of edge computing, it can lead to many challenges in terms of security and privacy issues. Thus, services that protect privacy and secure data are essential functions in edge computing. For example, the end user’s ownership and privacy information and control are separated, which can easily lead to data leakage, unauthorized data manipulation, and other data security concerns. Thus, the confidentiality and integrity of the data cannot be guaranteed and, so, more secure authentication and access mechanisms are required to ensure that the microservices are exposed only to authorized users. In this paper, we propose a microservice security agent to integrate the edge computing platform with the API gateway technology for presenting a secure authentication mechanism. The aim of this platform is to afford edge computing clients a practical application which provides user authentication and allows JSON Web Token (JWT)-based secure access to the services of edge computing. To integrate the edge computing platform with the API gateway, we implement a microservice security agent based on the open-source Kong in the EdgeX Foundry framework. Also to provide an easy-to-use approach with Kong, we implement REST APIs for generating new consumers, registering services, configuring access controls. Finally, the usability of the proposed approach is demonstrated by evaluating the round trip time (RTT). The results demonstrate the efficiency of the system and its suitability for real-world applications.


2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Ji-Ming Chen ◽  
Shi Chen ◽  
Xiang Wang ◽  
Lin Lin ◽  
Li Wang

With the rapid development of Internet of Things technology, a large amount of user information needs to be uploaded to the cloud server for computing and storage. Side-channel attacks steal the private information of other virtual machines by coresident virtual machines to bring huge security threats to edge computing. Virtual machine migration technology is currently the main way to defend against side-channel attacks. VM migration can effectively prevent attackers from realizing coresident virtual machines, thereby ensuring data security and privacy protection of edge computing based on the Internet of Things. This paper considers the relevance between application services and proposes a VM migration strategy based on service correlation. This strategy defines service relevance factors to quantify the degree of service relevance, build VM migration groups through service relevance factors, and effectively reduce communication overhead between servers during migration, design and implement the VM memory migration based on the post-copy method, effectively reduce the occurrence of page fault interruption, and improve the efficiency of VM migration.


2015 ◽  
Vol 11 (7) ◽  
pp. 958190
Author(s):  
Muhammad Khurram Khan ◽  
Yang Xiang ◽  
Shi-Jinn Horng ◽  
Hsiao-Hwa Chen

Sign in / Sign up

Export Citation Format

Share Document