{"title":"边缘和云计算中的数据保护","authors":"M. Ati, Reem Al Bostami","doi":"10.1109/ICOCO56118.2022.10031744","DOIUrl":null,"url":null,"abstract":"The massive growth of IoT and the rise of inventions in this field have led people to depend heavily on those technologies. This change has directed users to place their data, whether it is confidential or not, in specific storage known as the cloud. Cloud Computing enables users to save their data in the cloud. When IoT devices started generating large amounts of data, known as Big Data, the cloud couldn’t handle them due to its limited bandwidth and resources, so storing the data was moved to the endpoints of the network replacing cloud computing with edge computing. Edge computing allows users to store the data at the edge of the network. This is a promising technology now as it provides the best features of real-time and parallel processing and content perception. However, just like cloud computing the security of edge computing has risen a lot of concerns. Cloud security and Edge security have the most crucial concepts that gather data to process. Several security frameworks for cloud and edge computing have been discussed and invented. In our paper, we discuss the different challenges and solutions to said frameworks. We also compare the old and new frameworks of security according to their security encryption methods, confidentiality handling of data, and splitting of data through the packets.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Protection of Data in Edge and Cloud Computing\",\"authors\":\"M. Ati, Reem Al Bostami\",\"doi\":\"10.1109/ICOCO56118.2022.10031744\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The massive growth of IoT and the rise of inventions in this field have led people to depend heavily on those technologies. This change has directed users to place their data, whether it is confidential or not, in specific storage known as the cloud. Cloud Computing enables users to save their data in the cloud. When IoT devices started generating large amounts of data, known as Big Data, the cloud couldn’t handle them due to its limited bandwidth and resources, so storing the data was moved to the endpoints of the network replacing cloud computing with edge computing. Edge computing allows users to store the data at the edge of the network. This is a promising technology now as it provides the best features of real-time and parallel processing and content perception. However, just like cloud computing the security of edge computing has risen a lot of concerns. Cloud security and Edge security have the most crucial concepts that gather data to process. Several security frameworks for cloud and edge computing have been discussed and invented. In our paper, we discuss the different challenges and solutions to said frameworks. We also compare the old and new frameworks of security according to their security encryption methods, confidentiality handling of data, and splitting of data through the packets.\",\"PeriodicalId\":319652,\"journal\":{\"name\":\"2022 IEEE International Conference on Computing (ICOCO)\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE International Conference on Computing (ICOCO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOCO56118.2022.10031744\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Computing (ICOCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOCO56118.2022.10031744","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The massive growth of IoT and the rise of inventions in this field have led people to depend heavily on those technologies. This change has directed users to place their data, whether it is confidential or not, in specific storage known as the cloud. Cloud Computing enables users to save their data in the cloud. When IoT devices started generating large amounts of data, known as Big Data, the cloud couldn’t handle them due to its limited bandwidth and resources, so storing the data was moved to the endpoints of the network replacing cloud computing with edge computing. Edge computing allows users to store the data at the edge of the network. This is a promising technology now as it provides the best features of real-time and parallel processing and content perception. However, just like cloud computing the security of edge computing has risen a lot of concerns. Cloud security and Edge security have the most crucial concepts that gather data to process. Several security frameworks for cloud and edge computing have been discussed and invented. In our paper, we discuss the different challenges and solutions to said frameworks. We also compare the old and new frameworks of security according to their security encryption methods, confidentiality handling of data, and splitting of data through the packets.