diff_months: 10

Title: Edge Computing Security and Privacy

Download Solution Now
Added on: 2024-11-21 19:30:42
Order Code: SA Student Vishnu IT Computer Science Assignment(10_23_37300_193)
Question Task Id: 496446

Proposal Background

Title: Edge Computing Security and Privacy

Proposal

The new computing paradigm in the Internet of Things domain is known as IoT edge computing which functions by processing calculations at the edge of the network CITATION All201 l 1033 (Alli & Alam, 2020). The current technology aided by cloud and fog computing has created a lot of improvement leading to expected benefits associated with edge computing. In the last few years, there have been so many devices connected to the internet CITATION Pr22 l 1033 (Prez, Daz, & Berrocal, 2022). It had been predicted that by the year 2023, over 14.7 billion machines-to-machine connections will be corresponding to half of the connected devices CITATION Bel192 l 1033 (Bellavista, et al., 2019). This has created a lot of traffic flowing into the network.

One of the challenges that has been observed with increased traffic is cases of cyber-attack leading to insecurity and loss of privacy. Edge computing is expected to limit and regulate this challenge due to its ability to offload data efficiently.

The process of computation of the huge data can be very difficult and may not be usually completed through the Internet of Things devices themselves because of limited resources. This requires the exploitation of the cloud paradigm to help in addressing and offloading the large amount of dataCITATION Bel172 l 1033 (Foschini, Scotece, & Bellavista, 2017). To reduce this penalty, there is a need for an edge computing paradigm. Edge computing allows for the process of offloading the computing tasks to the nodes.

Edge computing is becoming a common technology of interest and has attracted a lot of interest. However, the number of research done on the topic is still very few and hence the need to explore more. There is an existing gap on how edge computing can help reduce the rising cases of cyber-attacks which has continuously compromised data security of most of the clients especially since most data is currently stored digitally. This phenomenon is also likely to change how manufacturers are designing IoT devices to be able to sync with edge computing thereby facilitating privacy and security.

Synthesis Matrix

CITATION All201 l 1033 (Alli & Alam, 2020). CITATION Pr22 l 1033 (Prez, Daz, & Berrocal, 2022) CITATION Bel192 l 1033 (Bellavista, et al., 2019). CITATION Bel172 l 1033 (Foschini, Scotece, & Bellavista, 2017) CITATION Bot191 l 1033 (Botta, de Donato, Persico, & Pescap, 2019). CITATION Sab21 l 1033 (Sabireen & Neelanarayanan, 2021)Main Idea A Researchers have continued to indicate that edge computing is mainly aimed at addressing and offloading computing tasks from the cloud taking them to the last smart device. Researchers are currently recommending the application of edge computing when it comes to different domains because the applications are having strict response times and reduce the infrastructure while improving privacy and increasing the efficiency of data management Adoption of edge computing in the industry is considered relevant because it is going to address the current challenges of inefficiency and loss of data curbing cases of cyber-attack.

The advantage of cloud computing is that it has remained clear with a common vision within the entire industry to provide solutions to the large amount of data which are connected to servers in the network The application of edge computing is expected to help in reducing the response time cost, sensitivity, data volume, resilience and bandwidth limitation. Edge computing allows for the process of offloading the computing tasks

The existing gap can create a threat of privacy and loss of data. Edge computing can address this challenge by creating efficiency.

Main Idea B Main Idea C References

BIBLIOGRAPHY l 1033 Alli, A., & Alam, M. (2020). The fog cloud of things: A survey on concepts, architecture, standards, tools, and applications. Internet of Things , 9:100177. https://doi.org/10.1016/j.iot.2020.100177.

Bellavista, P., Berrocal, J., Corradi, A., Das, S., Foschini, L., & Zanni, A. (2019). A survey on fog computing for the internet of things. Pervasive Mob Comput, 52:7199. https://doi.org/10.1016/j.pmcj.2018.12.007.

Botta, A., de Donato, W., Persico, V., & Pescap, A. (2019). Integration of Cloud computing and Internet of Things: A survey. Futur Gener Comput Syst, 56:684700. https://doi.org/10.1016/j.future.2015.09.021.

Foschini, L., Scotece, D., & Bellavista, P. (2017). Converging mobile edge computing, fog computing, and iot quality requirements. In: 2017 IEEE 5th international conference on future internet of things and cloud. IEEE, pp 313320. IEEE (2017).

Ghaffari, K., Lagzian, M., Kazemi, M., & Malekzadeh, G. (2019). A comprehensive framework for Internet of Things development: A grounded theory study of requirements. JEIM , 33(1):2350. https://doi.org/10.1108/JEIM-02-2019-0060.

Prez, J., Daz, J., & Berrocal, J. (2022). Edge Computing. Computing , 104, 27112747 https://doi.org/10.1007/s00607-022-01104-2.

Sabireen, H., & Neelanarayanan, V. (2021). A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges. ICT Express , 7(2):162176. https://doi.org/10.1016/j.icte.2021.05.004.

Research articles

https://ieeexplore.ieee.org/document/9076176 : DOI:10.1109/ACCESS.2020.2989456https://ieeexplore.ieee.org/document/9163078 : DOI:10.1109/JIOT.2020.3015432https://dl.acm.org/doi/10.1145/3362031 : https://doi.org/10.1145/3362031https://dl.acm.org/doi/10.1145/3555308 : https://doi.org/10.1145/3555308

Title : Security and Privacy in Edge Computing

Abstract

The description of the problem, importance of the problem, existing gaps, summarization of the significant concepts in the study focusing on key aspects, major results and conclusions.Keywords:

3-5 keywords

Table of Contents

Introduction

Literature review.................................................................................

The research proposal.........................................................................

Methodology.......................................................................................

Expected outcomes..................................................................................

Discussion and implications...............................................................

Conclusions........................................................................................

References..........................................................................................

Introduction

Description of the problem.

The aim of this proposal.Existing gaps

Related work overview

Proposed approach

Research question(s)

Preview of the structure of the proposal.

Literature review

Include only most relevant papers. Up to3 sentences about each paper are sufficient.

The literature review can be concluded with the discussion of some open problems and also with discussion how these problems will be addressed in this proposal.

The research proposal

Aim(s) of the research

Research question(s)

Research sub-question(s), if applicable.

This section can be merged into the IntroductionSection.

Methodology

Describe study type and (if any) variables

Describe your methodology (an approach)

Describe your method

Justify the choice of your methodology and methods

You can use charts and figures to describe your method(s)

Data collection - describe how you collected data for your research (if any)

Expected outcomes

Describe expected research results

You can use tables, charts and figures to describe your expected outcomes.

This section is optional and can be merged into the next section.

Discussion and implications

Discuss with reasons whether your study needs Ethics clearance.

Discuss findings that might occur and their potential impact on the field.

Conclusions

Briefly restate the research highlighting the implications of your research.

References

Use APA style

Appendices (if applicable)

You can include here tables, graphs, charts or any other material related to your study not included above but referred to.

  • Uploaded By : Pooja Dhaka
  • Posted on : November 21st, 2024
  • Downloads : 0
  • Views : 159

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more