Title: Edge Computing Security and Privacy
The new computing paradigm in the Internet of Things domain is known as IoT edge computing which functions by processing calculations at the edge of the network (Alli & Alam, 2020). The current technology aided by cloud and fog computing has created a lot of improvement leading to expected benefits associated with edge computing. In the last few years, there have been so many devices connected to the internet (Pérez, Díaz, & Berrocal, 2022). It had been predicted that by the year 2023, over 14.7 billion machines-to-machine connections will be corresponding to half of the connected devices (Bellavista, et al., 2019). This has created a lot of traffic flowing into the network.
One of the challenges that has been observed with increased traffic is cases of cyber-attack leading to insecurity and loss of privacy. Edge computing is expected to limit and regulate this challenge due to its ability to offload data efficiently.
The process of computation of the huge data can be very difficult and may not be usually completed through the Internet of Things devices themselves because of limited resources. This requires the exploitation of the cloud paradigm to help in addressing and offloading the large amount of data (Foschini, Scotece, & Bellavista, 2017). To reduce this penalty, there is a need for an edge computing paradigm. Edge computing allows for the process of offloading the computing tasks to the nodes.
Edge computing is becoming a common technology of interest and has attracted a lot of interest. However, the number of research done on the topic is still very few and hence the need to explore more. There is an existing gap on how edge computing can help reduce the rising cases of cyber-attacks which has continuously compromised data security of most of the clients especially since most data is currently stored digitally. This phenomenon is also likely to change how manufacturers are designing IoT devices to be able to sync with edge computing thereby facilitating privacy and security.
|(Alli & Alam, 2020).
|(Pérez, Díaz, & Berrocal, 2022)
|(Bellavista, et al., 2019).
|(Foschini, Scotece, & Bellavista, 2017)
|(Botta, de Donato, Persico, & Pescapé, 2019).
|(Sabireen & Neelanarayanan, 2021)
|Main Idea A
|Researchers have continued to indicate that edge computing is mainly aimed at addressing and offloading computing tasks from the cloud taking them to the last smart device.
|Researchers are currently recommending the application of edge computing when it comes to different domains because the applications are having strict response times and reduce the infrastructure while improving privacy and increasing the efficiency of data management
|Adoption of edge computing in the industry is considered relevant because it is going to address the current challenges of inefficiency and loss of data curbing cases of cyber-attack.
|The advantage of cloud computing is that it has remained clear with a common vision within the entire industry to provide solutions to the large amount of data which are connected to servers in the network
|The application of edge computing is expected to help in reducing the response time cost, sensitivity, data volume, resilience and bandwidth limitation.
|Edge computing allows for the process of offloading the computing tasks The existing gap can create a threat of privacy and loss of data. Edge computing can address this challenge by creating efficiency.
|Main Idea B
|Main Idea C