Likhwa Mlotshwa, Sheunesu M. Makura, Nickson M. Karie, V. Kebande
{"title":"动态IoT-Edge资源扩散中渗透计算范式的机会主义安全架构","authors":"Likhwa Mlotshwa, Sheunesu M. Makura, Nickson M. Karie, V. Kebande","doi":"10.1145/3415088.3415097","DOIUrl":null,"url":null,"abstract":"Increased heterogeneity of physical resources has had positive and negative effects in Internet of Things (IoT) through the existence of edge computing. As a result, there has been a need for effective dynamic management of IoT, cloud and edge resources, in order to address the existence of low-level constraints during resource migration. Nevertheless, the explosion of IoT devices and data has allowed orchestration of microservices to adopt an opportunistic approach to how applications and services are deployed in the edge in IoT platform. A notable approach has been osmotic computing that allows resources from a federated cloud to be able to diffuse from an ecosystem of higher solute (network properties and entities) concentration to solvent (applications, layered interfaces and services). We posit that, while computing resources and applications are able to move from the federated environment, to the cloud deployable models, to the edge, then to IoT ecosystem, there is a higher chance of susceptibility of threats and attacks that may be directed to the emerging edge applications/data due to dynamic emergent configurations. This paper proposes a 5-layer opportunistic architecture that adds security metrics across different levels of osmotic computing paradigm. The proposed 5-layer security architecture addresses the need for autonomously securing resources-edge computation, edge storage and emerging edge configurations as the computing resources move to a higher solute in heterogenous edge and cloud datacenters across IoT devices. This has been achieved by proposing security metrics that address the prevailing challenge with a degree of certainty.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Opportunistic security architecture for osmotic computing paradigm in dynamic IoT-Edge's resource diffusion\",\"authors\":\"Likhwa Mlotshwa, Sheunesu M. Makura, Nickson M. Karie, V. Kebande\",\"doi\":\"10.1145/3415088.3415097\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Increased heterogeneity of physical resources has had positive and negative effects in Internet of Things (IoT) through the existence of edge computing. As a result, there has been a need for effective dynamic management of IoT, cloud and edge resources, in order to address the existence of low-level constraints during resource migration. Nevertheless, the explosion of IoT devices and data has allowed orchestration of microservices to adopt an opportunistic approach to how applications and services are deployed in the edge in IoT platform. A notable approach has been osmotic computing that allows resources from a federated cloud to be able to diffuse from an ecosystem of higher solute (network properties and entities) concentration to solvent (applications, layered interfaces and services). We posit that, while computing resources and applications are able to move from the federated environment, to the cloud deployable models, to the edge, then to IoT ecosystem, there is a higher chance of susceptibility of threats and attacks that may be directed to the emerging edge applications/data due to dynamic emergent configurations. This paper proposes a 5-layer opportunistic architecture that adds security metrics across different levels of osmotic computing paradigm. The proposed 5-layer security architecture addresses the need for autonomously securing resources-edge computation, edge storage and emerging edge configurations as the computing resources move to a higher solute in heterogenous edge and cloud datacenters across IoT devices. This has been achieved by proposing security metrics that address the prevailing challenge with a degree of certainty.\",\"PeriodicalId\":274948,\"journal\":{\"name\":\"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3415088.3415097\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3415088.3415097","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Opportunistic security architecture for osmotic computing paradigm in dynamic IoT-Edge's resource diffusion
Increased heterogeneity of physical resources has had positive and negative effects in Internet of Things (IoT) through the existence of edge computing. As a result, there has been a need for effective dynamic management of IoT, cloud and edge resources, in order to address the existence of low-level constraints during resource migration. Nevertheless, the explosion of IoT devices and data has allowed orchestration of microservices to adopt an opportunistic approach to how applications and services are deployed in the edge in IoT platform. A notable approach has been osmotic computing that allows resources from a federated cloud to be able to diffuse from an ecosystem of higher solute (network properties and entities) concentration to solvent (applications, layered interfaces and services). We posit that, while computing resources and applications are able to move from the federated environment, to the cloud deployable models, to the edge, then to IoT ecosystem, there is a higher chance of susceptibility of threats and attacks that may be directed to the emerging edge applications/data due to dynamic emergent configurations. This paper proposes a 5-layer opportunistic architecture that adds security metrics across different levels of osmotic computing paradigm. The proposed 5-layer security architecture addresses the need for autonomously securing resources-edge computation, edge storage and emerging edge configurations as the computing resources move to a higher solute in heterogenous edge and cloud datacenters across IoT devices. This has been achieved by proposing security metrics that address the prevailing challenge with a degree of certainty.