Skip to main content
Top

2019 | OriginalPaper | Chapter

10. A Conceptual Framework for Security and Privacy in Edge Computing

Authors : S. A. Bragadeesh, Umamakeswari Arumugam

Published in: Edge Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the previous decade, Internet of Things (IoT) has paved ways for connecting devices, people, infrastructure, and practically any entity that can be connected. Cloud infrastructure has been the irrefutable part of IoT solutions with substantiated claims of resource provisioning, scalable platforms, and minimal infrastructure costs. Cloud computing does not argue well with applications that require reduced latency, positioning capabilities, and support for mobility. In such instances, edge computing can be used to compliment the cloud infrastructure and help in mitigating the various technical bottlenecks that are part of cloud services. In IoT environment, edge computing can help in improving energy efficiency, optimal resource utilization, and contextual data processing and in reducing the network traffic of backbone networks. The characteristics of edge computing may lead to new challenges for ensuring security and privacy. This chapter proposes a conceptual framework which consists of the essential components to ensure security and privacy for edge computing applications.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference N. Abbas et al., Mobile edge computing: a survey. IEEE IOT J. 5(1), 450–465 (2018) N. Abbas et al., Mobile edge computing: a survey. IEEE IOT J. 5(1), 450–465 (2018)
2.
go back to reference Y. Ai, M. Peng, K. Zhang, Edge cloud computing technologies for internet of things: a primer. Digit. Commun. Netw. 4(2), 77–86 (2018) Y. Ai, M. Peng, K. Zhang, Edge cloud computing technologies for internet of things: a primer. Digit. Commun. Netw. 4(2), 77–86 (2018)
3.
go back to reference F.A. Alaba et al., Internet of things security: a survey. J. Netw. Comput. Appl. 88(April), 10–28 (2017)CrossRef F.A. Alaba et al., Internet of things security: a survey. J. Netw. Comput. Appl. 88(April), 10–28 (2017)CrossRef
4.
go back to reference A. Alrawais et al., Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 21(2), 34–42 (2017)CrossRef A. Alrawais et al., Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 21(2), 34–42 (2017)CrossRef
5.
go back to reference A.V. Dastjerdi, R. Buyya, Fog computing: helping the internet of things realize its potential. Computer 49(8), 112–116 (2016)CrossRef A.V. Dastjerdi, R. Buyya, Fog computing: helping the internet of things realize its potential. Computer 49(8), 112–116 (2016)CrossRef
6.
go back to reference S. Khan, S. Parkinson, Y. Qin, Fog computing security: a review of current applications and security solutions. J. Cloud Comput. 6(1), 19 (2017)CrossRef S. Khan, S. Parkinson, Y. Qin, Fog computing security: a review of current applications and security solutions. J. Cloud Comput. 6(1), 19 (2017)CrossRef
7.
go back to reference P.G. Lopez et al., Edge-centric computing: vision and challenges. ACM SIGCOMM Comput. Commun. Rev. 45(5), 37–42 (2015)CrossRef P.G. Lopez et al., Edge-centric computing: vision and challenges. ACM SIGCOMM Comput. Commun. Rev. 45(5), 37–42 (2015)CrossRef
8.
go back to reference B.A. Martin et al., OpenFog Security Requirements and Approaches, (November, 2017), pp. 1–6 B.A. Martin et al., OpenFog Security Requirements and Approaches, (November, 2017), pp. 1–6
9.
go back to reference R. Roman, J. Lopez, M. Mambo, Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Futur. Gener. Comput. Syst. 78, 680–698 (2016)CrossRef R. Roman, J. Lopez, M. Mambo, Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Futur. Gener. Comput. Syst. 78, 680–698 (2016)CrossRef
12.
go back to reference Y. Guan, J. Shao, G. Wei, M. Xie, Data security and privacy in fog computing. IEEE Netw. 99, 1–6 (2018) Y. Guan, J. Shao, G. Wei, M. Xie, Data security and privacy in fog computing. IEEE Netw. 99, 1–6 (2018)
Metadata
Title
A Conceptual Framework for Security and Privacy in Edge Computing
Authors
S. A. Bragadeesh
Umamakeswari Arumugam
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-319-99061-3_10