scholarly journals Mobile edge computing for internet of things (IoT): security and privacy issues

Author(s):  
Atiqur Rahman ◽  
Guangfu Wu ◽  
Ali Md Liton

Nowadays, the masonry for environment-friendly and protected network structure designs, for example, the Internet of Things and gigantic data analytics are increasing at a faster pace compared to an earlier state. Mobile edge computing for an Internet of Things widget is information processing that is achieved at or close to the collectors of information in an Internet of Things system. Herein, we are proposing to temporarily evaluation the concepts, features, protection, and privacy applications of Internet of Things authorized mobile edge computing with its data protection view in our data-driven globe. We focus on illuminating one of kind components that need to be taken into consideration whilst creating a scalable, consistent, impenetrable and disseminated mobile edge computing structure. We also sum up the fundamental ideas regarding security threat alleviation strategies. After that, we walk around the existing challenges and opportunities in the area of mobile edge computing. In conclusion, we analyze a case study, in which a security protection mechanism can be hardened to lift out everyday jobs.

Author(s):  
Abdulmalik Alwarafy ◽  
Khaled A. Al-Thelaya ◽  
Mohamed Abdallah ◽  
Jens Schneider ◽  
Mounir Hamdi

Author(s):  
Indra Priyadharshini S. ◽  
Pradheeba Ulaganathan ◽  
Vigilson Prem M. ◽  
Yuvaraj B. R.

The evolution in computing strategies has shown wonders in reducing the reachability issue among different end devices. After centralized approaches, decentralized approaches started to take action, but with the latency in data pre-processing, computing very simple requests was the same as for the larger computations. Now it's time to have a simple decentralized environment called edge that is created very near to the end device. This makes edge location friendly and time friendly to different kinds of devices like smart, sensor, grid, etc. In this chapter, some of the serious and non-discussed security issues and privacy issues available on edge are explained neatly, and for a few of the problems, some solutions are also recommended. At last, a separate case study of edge computing challenges in healthcare is also explored, and solutions to those issues concerning that domain are shown.


2021 ◽  
Vol 20 (5s) ◽  
pp. 1-22
Author(s):  
Haoran Li ◽  
Chenyang Lu ◽  
Christopher D. Gill

Fault-tolerant coordination services have been widely used in distributed applications in cloud environments. Recent years have witnessed the emergence of time-sensitive applications deployed in edge computing environments, which introduces both challenges and opportunities for coordination services. On one hand, coordination services must recover from failures in a timely manner. On the other hand, edge computing employs local networked platforms that can be exploited to achieve timely recovery. In this work, we first identify the limitations of the leader election and recovery protocols underlying Apache ZooKeeper, the prevailing open-source coordination service. To reduce recovery latency from leader failures, we then design RT-Zookeeper with a set of novel features including a fast-convergence election protocol, a quorum channel notification mechanism, and a distributed epoch persistence protocol. We have implemented RT-Zookeeper based on ZooKeeper version 3.5.8. Empirical evaluation shows that RT-ZooKeeper achieves 91% reduction in maximum recovery latency in comparison to ZooKeeper. Furthermore, a case study demonstrates that fast failure recovery in RT-ZooKeeper can benefit a common messaging service like Kafka in terms of message latency.


Author(s):  
Martin Victor K ◽  
J. Immanuel Johnraja ◽  
Getzi Jeba Leelipushpam ◽  
J. Jebaveerasingh Jebadurai ◽  
I. Bildass Santhosam

2018 ◽  
Vol 5 (2) ◽  
pp. 1275-1284 ◽  
Author(s):  
Gopika Premsankar ◽  
Mario Di Francesco ◽  
Tarik Taleb

Sign in / Sign up

Export Citation Format

Share Document