Skip to main content

Enhancing Zero Trust Security in Edge Computing Environments: Challenges and Solutions

  • Conference paper
  • First Online:
Good Practices and New Perspectives in Information Systems and Technologies (WorldCIST 2024)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 987))

Included in the following conference series:

  • 481 Accesses

Abstract

Improving Zero Trust Security in Edge Computing Environments presents unique problems and necessitates novel solutions to secure sensitive data and lessen the dangers associated with edge computing installations. This article explores the challenges and solutions for improving Zero Trust Security in edge computing environments. The distributed and heterogeneous nature of edge ecosystems, limited resources, dynamic and mobile nature, scalability and performance concerns, network latency and bandwidth constraints, and scalability and performance concerns contribute to the challenges. Careful analysis and specific security solutions are needed to achieve a solid security posture. Several ways to overcome these issues include identity and access management mechanisms, secure network segmentation, continuous monitoring and threat detection systems, and authentication and authorization technologies. Zero Trust Security must be integrated with edge computing architectures for effective deployment. Edge security gateway and firewall systems provide perimeter protection for edge settings, while cloud-based security services and threat intelligence improve threat detection and response capabilities. The article also includes case studies and recommended practices, exploring lessons gained and ideas for implementing Zero Trust Security in edge computing settings. Future directions and emerging trends in Zero Trust Security for Edge Computing are investigated, offering insights into the growing security landscape in edge settings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alagappan, A., Venkatachary, S.K., Andrews, L.J.B.: Augmenting zero trust network architecture to enhance security in virtual power plants. Energy Rep. 8, 1309–1320 (2022)

    Article  Google Scholar 

  2. Ali, B., Hijjawi, S., Campbell, L.H., Gregory, M.A., Li, S.: A maturity framework for zero-trust security in multiaccess edge computing. Secur. Commun. Netw. 2022 (2022)

    Google Scholar 

  3. Cheng, R., Chen, S., Han, B.: Towards zero-trust security for the metaverse. IEEE Commun. Mag. (2023)

    Google Scholar 

  4. Federici, F., Martintoni, D., Senni, V.: A zero-trust architecture for remote access in industrial IoT infrastructures. Electronics 12(3), 566 (2023)

    Article  Google Scholar 

  5. He, Y., Huang, D., Chen, L., Ni, Y., Ma, X.: A survey on zero trust architecture: challenges and future trends. Wirel. Commun. Mob. Comput. 2022 (2022)

    Google Scholar 

  6. Manan, A., Min, Z., Mahmoudi, C., Formicola, V.: Extending 5G services with zero trust security pillars: a modular approach. In: 2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA), pp. 1–6. IEEE (2022)

    Google Scholar 

  7. Mohammed, S., Rangu, S.: To secure the cloud application using a novel efficient deep learning-based forensic framework. J. Interconnection Netw. 2350008 (2023)

    Google Scholar 

  8. Phiayura, P., Teerakanok, S.: A comprehensive framework for migrating to zero trust architecture. IEEE Access 11, 19487–19511 (2023)

    Article  Google Scholar 

  9. Ray, P.P.: Web3: a comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions. In: Internet of Things and Cyber-Physical Systems (2023)

    Google Scholar 

  10. Saleem, M., Warsi, M., Islam, S.: Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SAAS cloud computing environment. J. Inf. Secur. Appl. 72, 103389 (2023)

    Google Scholar 

  11. Sangaraju, V.V., Hargiss, K.: Zero trust security and multifactor authentication in fog computing environment. Available at SSRN 4472055

    Google Scholar 

  12. Sethi, P.S., Jain, A.: Edge computing. IN: Future Connected Technologies: Growing Convergence and Security Implications, p. 162 (2023)

    Google Scholar 

  13. Sharma, J., Kim, D., Lee, A., Seo, D.: On differential privacy-based framework for enhancing user data privacy in mobile edge computing environment. IEEE Access 9, 38107–38118 (2021)

    Article  Google Scholar 

  14. Sharma, R., Chan, C.A., Leckie, C.: Probabilistic distributed intrusion detection for zero-trust multi-access edge computing. In: NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, pp. 1–9. IEEE (2023)

    Google Scholar 

  15. Wang, J., Xu, J., Li, J., Xu, C., Xie, H.: Research on trusted security protection method for edge computing environment (2023)

    Google Scholar 

  16. Yang, Y., Bai, F., Yu, Z., Shen, T., Liu, Y., Gong, B.: An anonymous and supervisory cross-chain privacy protection protocol for zero-trust IoT application. ACM Trans. Sens. Netw. (2023)

    Google Scholar 

Download references

Acknowledgement

This work is funded by FCT/MEC through national funds and co-funded by FEDER—PT2020 partnership agreement under the project UIDB/50008/2020. This article is based upon work from COST Action CA21118 - Platform Work Inclusion Living Lab (P-WILL), supported by COST (European Cooperation in Science and Technology). More information on www.cost.eu.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ivan Miguel Pires .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ashfaq, F., Ahad, A., Hussain, M., Shayea, I., Pires, I.M. (2024). Enhancing Zero Trust Security in Edge Computing Environments: Challenges and Solutions. In: Rocha, Á., Adeli, H., Dzemyda, G., Moreira, F., Poniszewska-Marańda, A. (eds) Good Practices and New Perspectives in Information Systems and Technologies. WorldCIST 2024. Lecture Notes in Networks and Systems, vol 987. Springer, Cham. https://doi.org/10.1007/978-3-031-60221-4_41

Download citation

Publish with us

Policies and ethics