Abstract
In the previous decade, Internet of Things (IoT) has paved ways for connecting devices, people, infrastructure, and practically any entity that can be connected. Cloud infrastructure has been the irrefutable part of IoT solutions with substantiated claims of resource provisioning, scalable platforms, and minimal infrastructure costs. Cloud computing does not argue well with applications that require reduced latency, positioning capabilities, and support for mobility. In such instances, edge computing can be used to compliment the cloud infrastructure and help in mitigating the various technical bottlenecks that are part of cloud services. In IoT environment, edge computing can help in improving energy efficiency, optimal resource utilization, and contextual data processing and in reducing the network traffic of backbone networks. The characteristics of edge computing may lead to new challenges for ensuring security and privacy. This chapter proposes a conceptual framework which consists of the essential components to ensure security and privacy for edge computing applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
N. Abbas et al., Mobile edge computing: a survey. IEEE IOT J. 5(1), 450–465 (2018)
Y. Ai, M. Peng, K. Zhang, Edge cloud computing technologies for internet of things: a primer. Digit. Commun. Netw. 4(2), 77–86 (2018)
F.A. Alaba et al., Internet of things security: a survey. J. Netw. Comput. Appl. 88(April), 10–28 (2017)
A. Alrawais et al., Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 21(2), 34–42 (2017)
A.V. Dastjerdi, R. Buyya, Fog computing: helping the internet of things realize its potential. Computer 49(8), 112–116 (2016)
S. Khan, S. Parkinson, Y. Qin, Fog computing security: a review of current applications and security solutions. J. Cloud Comput. 6(1), 19 (2017)
P.G. Lopez et al., Edge-centric computing: vision and challenges. ACM SIGCOMM Comput. Commun. Rev. 45(5), 37–42 (2015)
B.A. Martin et al., OpenFog Security Requirements and Approaches, (November, 2017), pp. 1–6
R. Roman, J. Lopez, M. Mambo, Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Futur. Gener. Comput. Syst. 78, 680–698 (2016)
J. Tan, R. Gandhi, P. Narasimhan, Challenges in Security and Privacy for Mobile Edge-Clouds (Parallel Data Laboratory, Carnegie Mellon University, 2013). http://www.pdl.cmu.edu/PDL-FTP/associated/CMU-PDL-13-113.pdf
S. Yi, Z. Qin, Q. Li, Security and privacy issues of fog computing: A survey, in 10th International Conference on Wireless Algorithms, Systems, and Applications, ed. by K. Xu, H. Zhu (Eds), (Springer International Publishing, 2015), pp. 685–695. https://doi.org/10.1007/978-3-319-21837-3_67
Y. Guan, J. Shao, G. Wei, M. Xie, Data security and privacy in fog computing. IEEE Netw. 99, 1–6 (2018)
Acknowledgment
The authors wish to express their sincere thanks to the Department of Science & Technology, New Delhi, India (Project ID: SR/FST/ETI-371/2014), and express their sincere thanks to the INSPIRE fellowship (DST/INSPIRE Fellowship/2016/IF160837) for their financial support. The authors also thank SASTRA Deemed to be University, Thanjavur, India, for extending the infrastructural support to carry out this work.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Bragadeesh, S.A., Arumugam, U. (2019). A Conceptual Framework for Security and Privacy in Edge Computing. In: Al-Turjman, F. (eds) Edge Computing. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-99061-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-99061-3_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99060-6
Online ISBN: 978-3-319-99061-3
eBook Packages: EngineeringEngineering (R0)