Cybersecurity Implications of Edge Computing in Data Engineering

Authors

  • Nithin Reddy Desani Amazon.com

DOI:

https://doi.org/10.47941/ijce.2130

Keywords:

Cybersecurity, Edge Computing, Data Engineering

Abstract

Edge computing, as an extension of cloud computing, brings computation and data storage closer to the data source. This shift offers significant advantages in terms of latency reduction, bandwidth optimization, and real-time processing capabilities. By minimizing the distance that data needs to travel, edge computing enhances the performance of applications that require rapid data processing and immediate response times. This is particularly beneficial for Internet of Things (IoT) devices, autonomous vehicles, smart grids, and other applications that demand low-latency interactions. However, the decentralization inherent in edge computing introduces a unique set of cybersecurity challenges that are distinct from those faced in traditional centralized cloud environments. The distributed architecture of edge computing creates numerous points of vulnerability, each of which can be exploited by cyber attackers. Additionally, edge devices often operate with limited computational resources and power, which complicates the implementation of robust security measures. This paper explores the cybersecurity implications of edge computing in the context of data engineering. It begins with a comprehensive review of existing literature to establish the current understanding of edge computing security issues. The review identifies the primary vulnerabilities associated with edge computing, including those related to distributed architecture, data transmission, and resource constraints. Following the literature review, the paper delves into specific security threats that edge computing environments face. These include man-in-the-middle (MitM) attacks, distributed denial-of-service (DDoS) attacks, malware and ransomware, and insider threats. Each threat is analyzed to understand its potential impact on edge computing systems and the data they process.

Downloads

Download data is not yet available.

Author Biography

Nithin Reddy Desani, Amazon.com

Department of Data Engineering

References

Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge Computing: Vision and Challenges. IEEE Internet of Things Journal, 3(5), 637-646.

Satyanarayanan, M. (2017). The Emergence of Edge Computing. Computer, 50(1), 30-39.

Li, F., & Chen, X. (2018). Data Security and Privacy in Edge Computing Paradigm: Survey and Open Issues. IEEE Access, 6, 18209-18237.

Roman, R., Lopez, J., & Mambo, M. (2018). Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges. Future Generation Computer Systems, 78, 680-698.

Stojmenovic, I., & Wen, S. (2014). The Fog Computing Paradigm: Scenarios and Security Issues. Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 1-8.

Dastjerdi, A. V., & Buyya, R. (2016). Fog Computing: Helping the Internet of Things Realize Its Potential. Computer, 49(8), 112-116.

Zhao, J., Li, P., Peng, S., Yao, X., & Li, J. (2017). Security and Privacy Issues of Fog Computing: A Survey. In 2017 IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (pp. 1-6).

Yi, S., Qin, Z., & Li, Q. (2015). Security and Privacy Issues of Fog Computing: A Survey. In International Conference on Wireless Algorithms, Systems, and Applications (pp. 685-695). Springer, Cham.

Zhang, W., Tang, L., Liu, Y., He, X., & Chen, S. (2018). Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things. IEEE Transactions on Cloud Computing, 6(4), 900-913.

Porambage, P., Okwuibe, J., Liyanage, M., Taleb, T., Ylianttila, M., & Sethi, M. (2018). Survey on Multi-Access Edge Computing for Internet of Things Realization. IEEE Communications Surveys & Tutorials, 20(4), 2961-2991.

Mahmud, R., Kotagiri, R., & Buyya, R. (2018). Fog Computing: A Taxonomy, Survey, and Future Directions. In the Internet of Everything (pp. 103-130). Springer, Singapore.

Downloads

Published

2024-07-30

How to Cite

Desani, N. R. (2024). Cybersecurity Implications of Edge Computing in Data Engineering. International Journal of Computing and Engineering, 6(2), 24–34. https://doi.org/10.47941/ijce.2130

Issue

Section

Articles