{"title":"Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment","authors":"Seong-Jin Kim, K. Park","doi":"10.1145/3440943.3444355","DOIUrl":null,"url":null,"abstract":"Edge computing is a computing technology that collects, analyses and processes data near the devices that generate the data. This enables services providers to curtail unnecessary data transmissions and deliver low latency services. Cloud computing technology has evolved from centralized environment to edge computing environment due to the need of handling drastically increasing amount of data in cloud computing environments. As the cloud computing environment went through changes, there has been emerging security issues caused by the high mobility of containers. The increased mobility of containers in edge computing environment increased the possibility of data leakage because containers migrate between the edge nodes and we cannot be assured that the data was completely deleted from the edge node the container previously resided. To enhance security of the data in the edge cloud computing environment, we suggest a blueprint of the secure container to protect data from potential threats.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3440943.3444355","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Edge computing is a computing technology that collects, analyses and processes data near the devices that generate the data. This enables services providers to curtail unnecessary data transmissions and deliver low latency services. Cloud computing technology has evolved from centralized environment to edge computing environment due to the need of handling drastically increasing amount of data in cloud computing environments. As the cloud computing environment went through changes, there has been emerging security issues caused by the high mobility of containers. The increased mobility of containers in edge computing environment increased the possibility of data leakage because containers migrate between the edge nodes and we cannot be assured that the data was completely deleted from the edge node the container previously resided. To enhance security of the data in the edge cloud computing environment, we suggest a blueprint of the secure container to protect data from potential threats.