Skip to main content

A Conceptual Framework for Security and Privacy in Edge Computing

  • Chapter
  • First Online:
Edge Computing

Abstract

In the previous decade, Internet of Things (IoT) has paved ways for connecting devices, people, infrastructure, and practically any entity that can be connected. Cloud infrastructure has been the irrefutable part of IoT solutions with substantiated claims of resource provisioning, scalable platforms, and minimal infrastructure costs. Cloud computing does not argue well with applications that require reduced latency, positioning capabilities, and support for mobility. In such instances, edge computing can be used to compliment the cloud infrastructure and help in mitigating the various technical bottlenecks that are part of cloud services. In IoT environment, edge computing can help in improving energy efficiency, optimal resource utilization, and contextual data processing and in reducing the network traffic of backbone networks. The characteristics of edge computing may lead to new challenges for ensuring security and privacy. This chapter proposes a conceptual framework which consists of the essential components to ensure security and privacy for edge computing applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. N. Abbas et al., Mobile edge computing: a survey. IEEE IOT J. 5(1), 450–465 (2018)

    Google Scholar 

  2. Y. Ai, M. Peng, K. Zhang, Edge cloud computing technologies for internet of things: a primer. Digit. Commun. Netw. 4(2), 77–86 (2018)

    Google Scholar 

  3. F.A. Alaba et al., Internet of things security: a survey. J. Netw. Comput. Appl. 88(April), 10–28 (2017)

    Article  Google Scholar 

  4. A. Alrawais et al., Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 21(2), 34–42 (2017)

    Article  Google Scholar 

  5. A.V. Dastjerdi, R. Buyya, Fog computing: helping the internet of things realize its potential. Computer 49(8), 112–116 (2016)

    Article  Google Scholar 

  6. S. Khan, S. Parkinson, Y. Qin, Fog computing security: a review of current applications and security solutions. J. Cloud Comput. 6(1), 19 (2017)

    Article  Google Scholar 

  7. P.G. Lopez et al., Edge-centric computing: vision and challenges. ACM SIGCOMM Comput. Commun. Rev. 45(5), 37–42 (2015)

    Article  Google Scholar 

  8. B.A. Martin et al., OpenFog Security Requirements and Approaches, (November, 2017), pp. 1–6

    Google Scholar 

  9. R. Roman, J. Lopez, M. Mambo, Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Futur. Gener. Comput. Syst. 78, 680–698 (2016)

    Article  Google Scholar 

  10. J. Tan, R. Gandhi, P. Narasimhan, Challenges in Security and Privacy for Mobile Edge-Clouds (Parallel Data Laboratory, Carnegie Mellon University, 2013). http://www.pdl.cmu.edu/PDL-FTP/associated/CMU-PDL-13-113.pdf

  11. S. Yi, Z. Qin, Q. Li, Security and privacy issues of fog computing: A survey, in 10th International Conference on Wireless Algorithms, Systems, and Applications, ed. by K. Xu, H. Zhu (Eds), (Springer International Publishing, 2015), pp. 685–695. https://doi.org/10.1007/978-3-319-21837-3_67

    Chapter  Google Scholar 

  12. Y. Guan, J. Shao, G. Wei, M. Xie, Data security and privacy in fog computing. IEEE Netw. 99, 1–6 (2018)

    Google Scholar 

Download references

Acknowledgment

The authors wish to express their sincere thanks to the Department of Science & Technology, New Delhi, India (Project ID: SR/FST/ETI-371/2014), and express their sincere thanks to the INSPIRE fellowship (DST/INSPIRE Fellowship/2016/IF160837) for their financial support. The authors also thank SASTRA Deemed to be University, Thanjavur, India, for extending the infrastructural support to carry out this work.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bragadeesh, S.A., Arumugam, U. (2019). A Conceptual Framework for Security and Privacy in Edge Computing. In: Al-Turjman, F. (eds) Edge Computing. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-99061-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-99061-3_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-99060-6

  • Online ISBN: 978-3-319-99061-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics