Abstract
Improving Zero Trust Security in Edge Computing Environments presents unique problems and necessitates novel solutions to secure sensitive data and lessen the dangers associated with edge computing installations. This article explores the challenges and solutions for improving Zero Trust Security in edge computing environments. The distributed and heterogeneous nature of edge ecosystems, limited resources, dynamic and mobile nature, scalability and performance concerns, network latency and bandwidth constraints, and scalability and performance concerns contribute to the challenges. Careful analysis and specific security solutions are needed to achieve a solid security posture. Several ways to overcome these issues include identity and access management mechanisms, secure network segmentation, continuous monitoring and threat detection systems, and authentication and authorization technologies. Zero Trust Security must be integrated with edge computing architectures for effective deployment. Edge security gateway and firewall systems provide perimeter protection for edge settings, while cloud-based security services and threat intelligence improve threat detection and response capabilities. The article also includes case studies and recommended practices, exploring lessons gained and ideas for implementing Zero Trust Security in edge computing settings. Future directions and emerging trends in Zero Trust Security for Edge Computing are investigated, offering insights into the growing security landscape in edge settings.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alagappan, A., Venkatachary, S.K., Andrews, L.J.B.: Augmenting zero trust network architecture to enhance security in virtual power plants. Energy Rep. 8, 1309–1320 (2022)
Ali, B., Hijjawi, S., Campbell, L.H., Gregory, M.A., Li, S.: A maturity framework for zero-trust security in multiaccess edge computing. Secur. Commun. Netw. 2022 (2022)
Cheng, R., Chen, S., Han, B.: Towards zero-trust security for the metaverse. IEEE Commun. Mag. (2023)
Federici, F., Martintoni, D., Senni, V.: A zero-trust architecture for remote access in industrial IoT infrastructures. Electronics 12(3), 566 (2023)
He, Y., Huang, D., Chen, L., Ni, Y., Ma, X.: A survey on zero trust architecture: challenges and future trends. Wirel. Commun. Mob. Comput. 2022 (2022)
Manan, A., Min, Z., Mahmoudi, C., Formicola, V.: Extending 5G services with zero trust security pillars: a modular approach. In: 2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA), pp. 1–6. IEEE (2022)
Mohammed, S., Rangu, S.: To secure the cloud application using a novel efficient deep learning-based forensic framework. J. Interconnection Netw. 2350008 (2023)
Phiayura, P., Teerakanok, S.: A comprehensive framework for migrating to zero trust architecture. IEEE Access 11, 19487–19511 (2023)
Ray, P.P.: Web3: a comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions. In: Internet of Things and Cyber-Physical Systems (2023)
Saleem, M., Warsi, M., Islam, S.: Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SAAS cloud computing environment. J. Inf. Secur. Appl. 72, 103389 (2023)
Sangaraju, V.V., Hargiss, K.: Zero trust security and multifactor authentication in fog computing environment. Available at SSRN 4472055
Sethi, P.S., Jain, A.: Edge computing. IN: Future Connected Technologies: Growing Convergence and Security Implications, p. 162 (2023)
Sharma, J., Kim, D., Lee, A., Seo, D.: On differential privacy-based framework for enhancing user data privacy in mobile edge computing environment. IEEE Access 9, 38107–38118 (2021)
Sharma, R., Chan, C.A., Leckie, C.: Probabilistic distributed intrusion detection for zero-trust multi-access edge computing. In: NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, pp. 1–9. IEEE (2023)
Wang, J., Xu, J., Li, J., Xu, C., Xie, H.: Research on trusted security protection method for edge computing environment (2023)
Yang, Y., Bai, F., Yu, Z., Shen, T., Liu, Y., Gong, B.: An anonymous and supervisory cross-chain privacy protection protocol for zero-trust IoT application. ACM Trans. Sens. Netw. (2023)
Acknowledgement
This work is funded by FCT/MEC through national funds and co-funded by FEDER—PT2020 partnership agreement under the project UIDB/50008/2020. This article is based upon work from COST Action CA21118 - Platform Work Inclusion Living Lab (P-WILL), supported by COST (European Cooperation in Science and Technology). More information on www.cost.eu.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ashfaq, F., Ahad, A., Hussain, M., Shayea, I., Pires, I.M. (2024). Enhancing Zero Trust Security in Edge Computing Environments: Challenges and Solutions. In: Rocha, Á., Adeli, H., Dzemyda, G., Moreira, F., Poniszewska-Marańda, A. (eds) Good Practices and New Perspectives in Information Systems and Technologies. WorldCIST 2024. Lecture Notes in Networks and Systems, vol 987. Springer, Cham. https://doi.org/10.1007/978-3-031-60221-4_41
Download citation
DOI: https://doi.org/10.1007/978-3-031-60221-4_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-60220-7
Online ISBN: 978-3-031-60221-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)