Title: Edge Computing Security and Privacy
- University :
online private college Exam Question Bank is not sponsored or endorsed by this college or university.
Proposal Background
Title: Edge Computing Security and Privacy
Proposal
The new computing paradigm in the Internet of Things domain is known as IoT edge computing which functions by processing calculations at the edge of the network CITATION All201 l 1033 (Alli & Alam, 2020). The current technology aided by cloud and fog computing has created a lot of improvement leading to expected benefits associated with edge computing. In the last few years, there have been so many devices connected to the internet CITATION Pr22 l 1033 (Prez, Daz, & Berrocal, 2022). It had been predicted that by the year 2023, over 14.7 billion machines-to-machine connections will be corresponding to half of the connected devices CITATION Bel192 l 1033 (Bellavista, et al., 2019). This has created a lot of traffic flowing into the network.
One of the challenges that has been observed with increased traffic is cases of cyber-attack leading to insecurity and loss of privacy. Edge computing is expected to limit and regulate this challenge due to its ability to offload data efficiently.
The process of computation of the huge data can be very difficult and may not be usually completed through the Internet of Things devices themselves because of limited resources. This requires the exploitation of the cloud paradigm to help in addressing and offloading the large amount of dataCITATION Bel172 l 1033 (Foschini, Scotece, & Bellavista, 2017). To reduce this penalty, there is a need for an edge computing paradigm. Edge computing allows for the process of offloading the computing tasks to the nodes.
Edge computing is becoming a common technology of interest and has attracted a lot of interest. However, the number of research done on the topic is still very few and hence the need to explore more. There is an existing gap on how edge computing can help reduce the rising cases of cyber-attacks which has continuously compromised data security of most of the clients especially since most data is currently stored digitally. This phenomenon is also likely to change how manufacturers are designing IoT devices to be able to sync with edge computing thereby facilitating privacy and security.
Synthesis Matrix
CITATION All201 l 1033 (Alli & Alam, 2020). CITATION Pr22 l 1033 (Prez, Daz, & Berrocal, 2022) CITATION Bel192 l 1033 (Bellavista, et al., 2019). CITATION Bel172 l 1033 (Foschini, Scotece, & Bellavista, 2017) CITATION Bot191 l 1033 (Botta, de Donato, Persico, & Pescap, 2019). CITATION Sab21 l 1033 (Sabireen & Neelanarayanan, 2021)Main Idea A Researchers have continued to indicate that edge computing is mainly aimed at addressing and offloading computing tasks from the cloud taking them to the last smart device. Researchers are currently recommending the application of edge computing when it comes to different domains because the applications are having strict response times and reduce the infrastructure while improving privacy and increasing the efficiency of data management Adoption of edge computing in the industry is considered relevant because it is going to address the current challenges of inefficiency and loss of data curbing cases of cyber-attack.
The advantage of cloud computing is that it has remained clear with a common vision within the entire industry to provide solutions to the large amount of data which are connected to servers in the network The application of edge computing is expected to help in reducing the response time cost, sensitivity, data volume, resilience and bandwidth limitation. Edge computing allows for the process of offloading the computing tasks
The existing gap can create a threat of privacy and loss of data. Edge computing can address this challenge by creating efficiency.
Main Idea B Main Idea C References
BIBLIOGRAPHY l 1033 Alli, A., & Alam, M. (2020). The fog cloud of things: A survey on concepts, architecture, standards, tools, and applications. Internet of Things , 9:100177. https://doi.org/10.1016/j.iot.2020.100177.
Bellavista, P., Berrocal, J., Corradi, A., Das, S., Foschini, L., & Zanni, A. (2019). A survey on fog computing for the internet of things. Pervasive Mob Comput, 52:7199. https://doi.org/10.1016/j.pmcj.2018.12.007.
Botta, A., de Donato, W., Persico, V., & Pescap, A. (2019). Integration of Cloud computing and Internet of Things: A survey. Futur Gener Comput Syst, 56:684700. https://doi.org/10.1016/j.future.2015.09.021.
Foschini, L., Scotece, D., & Bellavista, P. (2017). Converging mobile edge computing, fog computing, and iot quality requirements. In: 2017 IEEE 5th international conference on future internet of things and cloud. IEEE, pp 313320. IEEE (2017).
Ghaffari, K., Lagzian, M., Kazemi, M., & Malekzadeh, G. (2019). A comprehensive framework for Internet of Things development: A grounded theory study of requirements. JEIM , 33(1):2350. https://doi.org/10.1108/JEIM-02-2019-0060.
Prez, J., Daz, J., & Berrocal, J. (2022). Edge Computing. Computing , 104, 27112747 https://doi.org/10.1007/s00607-022-01104-2.
Sabireen, H., & Neelanarayanan, V. (2021). A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges. ICT Express , 7(2):162176. https://doi.org/10.1016/j.icte.2021.05.004.
Research articles
https://ieeexplore.ieee.org/document/9076176 : DOI:10.1109/ACCESS.2020.2989456https://ieeexplore.ieee.org/document/9163078 : DOI:10.1109/JIOT.2020.3015432https://dl.acm.org/doi/10.1145/3362031 : https://doi.org/10.1145/3362031https://dl.acm.org/doi/10.1145/3555308 : https://doi.org/10.1145/3555308
Title : Security and Privacy in Edge Computing
Abstract
The description of the problem, importance of the problem, existing gaps, summarization of the significant concepts in the study focusing on key aspects, major results and conclusions.Keywords:
3-5 keywords
Table of Contents
Introduction
Literature review.................................................................................
The research proposal.........................................................................
Methodology.......................................................................................
Expected outcomes..................................................................................
Discussion and implications...............................................................
Conclusions........................................................................................
References..........................................................................................
Introduction
Description of the problem.
The aim of this proposal.Existing gaps
Related work overview
Proposed approach
Research question(s)
Preview of the structure of the proposal.
Literature review
Include only most relevant papers. Up to3 sentences about each paper are sufficient.
The literature review can be concluded with the discussion of some open problems and also with discussion how these problems will be addressed in this proposal.
The research proposal
Aim(s) of the research
Research question(s)
Research sub-question(s), if applicable.
This section can be merged into the IntroductionSection.
Methodology
Describe study type and (if any) variables
Describe your methodology (an approach)
Describe your method
Justify the choice of your methodology and methods
You can use charts and figures to describe your method(s)
Data collection - describe how you collected data for your research (if any)
Expected outcomes
Describe expected research results
You can use tables, charts and figures to describe your expected outcomes.
This section is optional and can be merged into the next section.
Discussion and implications
Discuss with reasons whether your study needs Ethics clearance.
Discuss findings that might occur and their potential impact on the field.
Conclusions
Briefly restate the research highlighting the implications of your research.
References
Use APA style
Appendices (if applicable)
You can include here tables, graphs, charts or any other material related to your study not included above but referred to.