Protection of Data in Edge and Cloud Computing

M. Ati, Reem Al Bostami
{"title":"Protection of Data in Edge and Cloud Computing","authors":"M. Ati, Reem Al Bostami","doi":"10.1109/ICOCO56118.2022.10031744","DOIUrl":null,"url":null,"abstract":"The massive growth of IoT and the rise of inventions in this field have led people to depend heavily on those technologies. This change has directed users to place their data, whether it is confidential or not, in specific storage known as the cloud. Cloud Computing enables users to save their data in the cloud. When IoT devices started generating large amounts of data, known as Big Data, the cloud couldn’t handle them due to its limited bandwidth and resources, so storing the data was moved to the endpoints of the network replacing cloud computing with edge computing. Edge computing allows users to store the data at the edge of the network. This is a promising technology now as it provides the best features of real-time and parallel processing and content perception. However, just like cloud computing the security of edge computing has risen a lot of concerns. Cloud security and Edge security have the most crucial concepts that gather data to process. Several security frameworks for cloud and edge computing have been discussed and invented. In our paper, we discuss the different challenges and solutions to said frameworks. We also compare the old and new frameworks of security according to their security encryption methods, confidentiality handling of data, and splitting of data through the packets.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Computing (ICOCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOCO56118.2022.10031744","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The massive growth of IoT and the rise of inventions in this field have led people to depend heavily on those technologies. This change has directed users to place their data, whether it is confidential or not, in specific storage known as the cloud. Cloud Computing enables users to save their data in the cloud. When IoT devices started generating large amounts of data, known as Big Data, the cloud couldn’t handle them due to its limited bandwidth and resources, so storing the data was moved to the endpoints of the network replacing cloud computing with edge computing. Edge computing allows users to store the data at the edge of the network. This is a promising technology now as it provides the best features of real-time and parallel processing and content perception. However, just like cloud computing the security of edge computing has risen a lot of concerns. Cloud security and Edge security have the most crucial concepts that gather data to process. Several security frameworks for cloud and edge computing have been discussed and invented. In our paper, we discuss the different challenges and solutions to said frameworks. We also compare the old and new frameworks of security according to their security encryption methods, confidentiality handling of data, and splitting of data through the packets.
边缘和云计算中的数据保护
物联网的大规模增长和该领域发明的兴起导致人们严重依赖这些技术。这一变化引导用户将他们的数据(无论是否机密)放在被称为云的特定存储中。云计算使用户能够将数据保存在云中。当物联网设备开始产生大量数据(即大数据)时,由于带宽和资源有限,云无法处理这些数据,因此存储数据被移动到网络的端点,用边缘计算取代了云计算。边缘计算允许用户将数据存储在网络的边缘。这是一项很有前途的技术,因为它提供了实时、并行处理和内容感知的最佳特性。然而,就像云计算一样,边缘计算的安全性也引起了很多关注。云安全和边缘安全具有收集数据以进行处理的最关键概念。云计算和边缘计算的几个安全框架已经被讨论和发明。在本文中,我们讨论了上述框架的不同挑战和解决方案。我们还根据它们的安全加密方法、数据的机密性处理和通过数据包的数据分割来比较新旧安全框架。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信