Cybersecurity Implications of Edge Computing in Data Engineering
DOI:
https://doi.org/10.47941/ijce.2130Keywords:
Cybersecurity, Edge Computing, Data EngineeringAbstract
Edge computing, as an extension of cloud computing, brings computation and data storage closer to the data source. This shift offers significant advantages in terms of latency reduction, bandwidth optimization, and real-time processing capabilities. By minimizing the distance that data needs to travel, edge computing enhances the performance of applications that require rapid data processing and immediate response times. This is particularly beneficial for Internet of Things (IoT) devices, autonomous vehicles, smart grids, and other applications that demand low-latency interactions. However, the decentralization inherent in edge computing introduces a unique set of cybersecurity challenges that are distinct from those faced in traditional centralized cloud environments. The distributed architecture of edge computing creates numerous points of vulnerability, each of which can be exploited by cyber attackers. Additionally, edge devices often operate with limited computational resources and power, which complicates the implementation of robust security measures. This paper explores the cybersecurity implications of edge computing in the context of data engineering. It begins with a comprehensive review of existing literature to establish the current understanding of edge computing security issues. The review identifies the primary vulnerabilities associated with edge computing, including those related to distributed architecture, data transmission, and resource constraints. Following the literature review, the paper delves into specific security threats that edge computing environments face. These include man-in-the-middle (MitM) attacks, distributed denial-of-service (DDoS) attacks, malware and ransomware, and insider threats. Each threat is analyzed to understand its potential impact on edge computing systems and the data they process.
Downloads
References
Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge Computing: Vision and Challenges. IEEE Internet of Things Journal, 3(5), 637-646.
Satyanarayanan, M. (2017). The Emergence of Edge Computing. Computer, 50(1), 30-39.
Li, F., & Chen, X. (2018). Data Security and Privacy in Edge Computing Paradigm: Survey and Open Issues. IEEE Access, 6, 18209-18237.
Roman, R., Lopez, J., & Mambo, M. (2018). Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges. Future Generation Computer Systems, 78, 680-698.
Stojmenovic, I., & Wen, S. (2014). The Fog Computing Paradigm: Scenarios and Security Issues. Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 1-8.
Dastjerdi, A. V., & Buyya, R. (2016). Fog Computing: Helping the Internet of Things Realize Its Potential. Computer, 49(8), 112-116.
Zhao, J., Li, P., Peng, S., Yao, X., & Li, J. (2017). Security and Privacy Issues of Fog Computing: A Survey. In 2017 IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (pp. 1-6).
Yi, S., Qin, Z., & Li, Q. (2015). Security and Privacy Issues of Fog Computing: A Survey. In International Conference on Wireless Algorithms, Systems, and Applications (pp. 685-695). Springer, Cham.
Zhang, W., Tang, L., Liu, Y., He, X., & Chen, S. (2018). Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things. IEEE Transactions on Cloud Computing, 6(4), 900-913.
Porambage, P., Okwuibe, J., Liyanage, M., Taleb, T., Ylianttila, M., & Sethi, M. (2018). Survey on Multi-Access Edge Computing for Internet of Things Realization. IEEE Communications Surveys & Tutorials, 20(4), 2961-2991.
Mahmud, R., Kotagiri, R., & Buyya, R. (2018). Fog Computing: A Taxonomy, Survey, and Future Directions. In the Internet of Everything (pp. 103-130). Springer, Singapore.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Nithin Reddy Desani
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.