diff_months: 10

Prepare 7 to 9 slides of power point presentation on the Title: Edge Computing Security and Privacy

Download Solution Now
Added on: 2024-11-22 14:30:28
Order Code: SA Student vishnu Other Subjects Assignment(9_23_36355_149)
Question Task Id: 494665
Prepare 7 to 9 slides of power point presentation on the Title: Edge Computing Security and Privacy

1. PPTX Slide : Introduction:

o Background, context, overview

o Purpose of the study

2. PPTX Slide : Summary of Research Questions and Purpose:

o Research questions, aims, hypotheses that are clear and specific

o Definition of the paradigm and methodology chosen for the study, including

the rationale for the choice; introduction to conceptual or theoretical

framework

3. PPTX Slide : Summary of Relevant Literature:

o Current, balanced, relevant, significant

o Extensive

4. PPTX Slide : Summary of Methods, Methodology and Data Collection:

o Variables used and relations between variables

o Data collection and measurement tools

5. PPTX Slide : Summary of any other considerations/aspects of the research, e.g., OHS/Safety

and/or Ethics.

6. PPTX Slide : References

Proposal Background

Title: Edge Computing Security and Privacy

Proposal

The new computing paradigm in the Internet of Things domain is known as IoT edge computing which functions by processing calculations at the edge of the network. The current technology aided by cloud and fog computing has created a lot of improvement leading to expected benefits associated with edge computing. In the last few years, there have been so many devices connected to the internet. It had been predicted that by the year 2023, over 14.7 billion machines-to-machine connections will be corresponding to half of the connected devices. This has created a lot of traffic flowing into the network.

One of the challenges that has been observed with increased traffic is cases of cyber-attack leading to insecurity and loss of privacy. Edge computing is expected to limit and regulate this challenge due to its ability to offload data efficiently.

The process of computation of the huge data can be very difficult and may not be usually completed through the Internet of Things devices themselves because of limited resources. This requires the exploitation of the cloud paradigm to help in addressing and offloading the large amount of data. To reduce this penalty, there is a need for an edge computing paradigm. Edge computing allows for the process of offloading the computing tasks to the nodes.

Edge computing is becoming a common technology of interest and has attracted a lot of interest. However, the number of research done on the topic is still very few and hence the need to explore more. There is an existing gap on how edge computing can help reduce the rising cases of cyber-attacks which has continuously compromised data security of most of the clients especially since most data is currently stored digitally. This phenomenon is also likely to change how manufacturers are designing IoT devices to be able to sync with edge computing thereby facilitating privacy and security.

Synthesis Matrix

. . . Main Idea A Researchers have continued to indicate that edge computing is mainly aimed at addressing and offloading computing tasks from the cloud taking them to the last smart device. Researchers are currently recommending the application of edge computing when it comes to different domains because the applications are having strict response times and reduce the infrastructure while improving privacy and increasing the efficiency of data management Adoption of edge computing in the industry is considered relevant because it is going to address the current challenges of inefficiency and loss of data curbing cases of cyber-attack.

The advantage of cloud computing is that it has remained clear with a common vision within the entire industry to provide solutions to the large amount of data which are connected to servers in the network The application of edge computing is expected to help in reducing the response time cost, sensitivity, data volume, resilience and bandwidth limitation. Edge computing allows for the process of offloading the computing tasks

The existing gap can create a threat of privacy and loss of data. Edge computing can address this challenge by creating efficiency.

Main Idea B Main Idea C References

Alli, A., & Alam, M. (2020). The fog cloud of things: A survey on concepts, architecture, standards, tools, and applications. Internet of Things , 9:100177. https://doi.org/10.1016/j.iot.2020.100177.

Bellavista, P., Berrocal, J., Corradi, A., Das, S., Foschini, L., & Zanni, A. (2019). A survey on fog computing for the internet of things. Pervasive Mob Comput, 52:7199. https://doi.org/10.1016/j.pmcj.2018.12.007.

Botta, A., de Donato, W., Persico, V., & Pescap, A. (2019). Integration of Cloud computing and Internet of Things: A survey. Futur Gener Comput Syst, 56:684700. https://doi.org/10.1016/j.future.2015.09.021.

Foschini, L., Scotece, D., & Bellavista, P. (2017). Converging mobile edge computing, fog computing, and iot quality requirements. In: 2017 IEEE 5th international conference on future internet of things and cloud. IEEE, pp 313320. IEEE (2017).

Ghaffari, K., Lagzian, M., Kazemi, M., & Malekzadeh, G. (2019). A comprehensive framework for Internet of Things development: A grounded theory study of requirements. JEIM , 33(1):2350. https://doi.org/10.1108/JEIM-02-2019-0060.

Prez, J., Daz, J., & Berrocal, J. (2022). Edge Computing. Computing , 104, 27112747 https://doi.org/10.1007/s00607-022-01104-2.

Sabireen, H., & Neelanarayanan, V. (2021). A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges. ICT Express , 7(2):162176. https://doi.org/10.1016/j.icte.2021.05.004.

  • Uploaded By : Pooja Dhaka
  • Posted on : November 22nd, 2024
  • Downloads : 0
  • Views : 141

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more