Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment

Seong-Jin Kim, K. Park
{"title":"Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment","authors":"Seong-Jin Kim, K. Park","doi":"10.1145/3440943.3444355","DOIUrl":null,"url":null,"abstract":"Edge computing is a computing technology that collects, analyses and processes data near the devices that generate the data. This enables services providers to curtail unnecessary data transmissions and deliver low latency services. Cloud computing technology has evolved from centralized environment to edge computing environment due to the need of handling drastically increasing amount of data in cloud computing environments. As the cloud computing environment went through changes, there has been emerging security issues caused by the high mobility of containers. The increased mobility of containers in edge computing environment increased the possibility of data leakage because containers migrate between the edge nodes and we cannot be assured that the data was completely deleted from the edge node the container previously resided. To enhance security of the data in the edge cloud computing environment, we suggest a blueprint of the secure container to protect data from potential threats.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3440943.3444355","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Edge computing is a computing technology that collects, analyses and processes data near the devices that generate the data. This enables services providers to curtail unnecessary data transmissions and deliver low latency services. Cloud computing technology has evolved from centralized environment to edge computing environment due to the need of handling drastically increasing amount of data in cloud computing environments. As the cloud computing environment went through changes, there has been emerging security issues caused by the high mobility of containers. The increased mobility of containers in edge computing environment increased the possibility of data leakage because containers migrate between the edge nodes and we cannot be assured that the data was completely deleted from the edge node the container previously resided. To enhance security of the data in the edge cloud computing environment, we suggest a blueprint of the secure container to protect data from potential threats.
边缘云计算环境下安全容器数据保护蓝图
边缘计算是一种在生成数据的设备附近收集、分析和处理数据的计算技术。这使服务提供商能够减少不必要的数据传输并提供低延迟服务。由于在云计算环境中需要处理急剧增加的数据量,云计算技术已经从集中式环境发展到边缘计算环境。随着云计算环境的变化,容器的高移动性带来了新的安全问题。容器在边缘计算环境中增加流动性的增加数据泄漏的可能性,因为容器边缘节点之间的迁移和我们不能保证完全删除从边缘节点的数据容器之前居住。加强安全云计算环境中数据的优势,我们建议的蓝图从潜在威胁安全的容器来保护数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信