The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Data Security and Privacy Requirements in Edge Computing: A Systemic Review
Author(s): Chinnasamy P. (Sri Shakthi Institute of Engineering and Technology, India), Rojaramani D. (Sethu Institute of Technology, India), Praveena V. (Dr. N. G. P. Institute of Technology, India), Annlin Jeba S. V. (Sree Buddha College of Engineering, India)and Bensujin B. (University of Technology and Applied Sciences, Nizwa, Oman)
Copyright: 2021
Pages: 17
EISBN13: 9781799885740
Purchase
View Sample PDF
Abstract
Several researchers analyzed the information security problems in edge computing, though not all studied the criteria for security and confidentiality in detail. This chapter intends to extensively evaluate the edge computing protection and confidentiality standards and the different technical approaches utilized by the technologies often used mitigate the risks. This study describes the latest research and emphasizes the following: (1) the definition of edge computing protection and confidentiality criteria, (2) state-of-the-art strategies used to mitigate protection and privacy risks, (3) developments in technical approaches, (4) measures used to measure the efficiency of interventions, (5) the categorization of threats on the edge device and the related technical pattern used to mitigate the attackers, and (6) research directions for potential professionals in the field of edge devices privacy and security.
Related Content
Vasundhara Sen, Ashish Kulkarni.
© 2020.
35 pages.
|
Mohana Priya Rajendran, Muthuminal R..
© 2023.
20 pages.
|
Luiz Carlos Roma Júnior, Lívia Castelani, Thatiane Mendes Mitsunaga.
© 2023.
18 pages.
|
Sunita Panda, Padma Charan Sahu, Kamalanathan Chandran.
© 2021.
18 pages.
|
Kamatchi Periyasamy, Anitha Kumari K., Sebastin Arockia Akash.
© 2021.
32 pages.
|
|
|