Constructive Solutions for Security and Privacy Issues at the Edge: Securing Edge Framework – A Healthcare Application Use Case

Constructive Solutions for Security and Privacy Issues at the Edge: Securing Edge Framework – A Healthcare Application Use Case

Indra Priyadharshini S., Pradheeba Ulaganathan, Vigilson Prem M., Yuvaraj B. R.
DOI: 10.4018/978-1-6684-5700-9.ch022
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The evolution in computing strategies has shown wonders in reducing the reachability issue among different end devices. After centralized approaches, decentralized approaches started to take action, but with the latency in data pre-processing, computing very simple requests was the same as for the larger computations. Now it's time to have a simple decentralized environment called edge that is created very near to the end device. This makes edge location friendly and time friendly to different kinds of devices like smart, sensor, grid, etc. In this chapter, some of the serious and non-discussed security issues and privacy issues available on edge are explained neatly, and for a few of the problems, some solutions are also recommended. At last, a separate case study of edge computing challenges in healthcare is also explored, and solutions to those issues concerning that domain are shown.
Chapter Preview
Top

Introduction

Edge is only the augmentation of the fog. Edge computing has the accompanying attributes: it ranges to contiguous physical areas; upholds online examination; the administration is given by savvy, yet not ground-breaking gadgets; underpins different interchanges arranges, and is circulated computing The objectives of the edge computing worldview are to diminish the information volume and traffic to fog workers, decline inertness, and improve nature of administration (QoS). Edge computing comprises 3 fundamental parts, (an) IoT nodes, (b) edge nodes, and (c) back-end fog. The principle parts of layer 1 are the IoT gadgets and correspondence joins between them. These gadgets are answerable for detecting and acting in the earth by producing occasions and sending them to higher layers. Layer 2 involves the switches, switches, entryways, and gadgets that encourage the associations between gadgets at the edge of the system and the Internet. This layer mirrors the great definition proposed for Edge computing. At present, the Edge infrastructure idea may likewise remember the gadgets for layer 3. Layer 3 contains the infrastructure for customary Fog computing (elite workers, and server farms with immense capacity and processing limits) (Ren et al., 2019)

Another captivating zone where the modernization has pushed its foundations is IoT. IoT is getting expanding coordinated into our everyday lives. Contemplating this IoT can be utilized to give a skilled and sorted out way to deal with and improve the healthcare of humankind. By utilizing these smart articles, they can be coordinated into healthcare to offer wise types of assistance for far off observing the wellbeing and prosperity of patients. By utilizing this it could help manage staff deficiencies and reaction times inside healthcare. As IoT has the attribute of pervasiveness the frameworks associated with healthcare (medication, apparatuses, and people) can permit the ceaseless observing and the board of these substances. Along these lines, the expense and nature of the healthcare offered can be improved via robotizing processes that were recently directed by people. How IoT and Edge go connected at the hip?

Edge computing gives calculation, stockpiling, and systems administration administrations between end gadgets (Things) and customary fog computing server farms. Edge computing stage is ordinarily situated at the edge of the system; here and there the expression “edge” is utilized reciprocally with the expression “edge”. It gives low inertness, area mindfulness and improves Quality of Service (QoS) and Quality of Experience (QoE) for healthcare administrations by diminishing idleness and expanding its consistency when contrasted with the fog. Despite edge computing being a promising new turn of events, to serve IoT Things and applications effectively, there are various explorations provokes that should be thought of. Inside edge computing which can comprise of different gadgets in the system (switches, switches, and so on.) and end gadgets or potentially things (smartphones, wearable gadgets, and virtual sensor nodes that could be utilized inside healthcare frameworks)? Consequently having the option to gather, configuration, and process this heterogeneous information just as the capacity of correspondence among various gadgets is as yet an open examination challenge.

Considering that edge devices work at the edge of networks, edge faces new security also, security challenges on the head of those inherited from fog computing. Assault vectors, for example, man-in-the-middle have the potential to become an ordinary assault in Edge computing. Edge computing is a promising answer for help data fusion, filtering, and investigation in e-healthcare systems since it extends data computing from fog to the edge of a network and is more intelligent and powerful than e-healthcare devices. Without appropriate security and protection protections for underlying connected health systems, providers and patients need trust in the arrangements. News about the absence of security of IoT devices and unethical practices of some companies that gather and abuse personal data from owners of connected devices have made consumers care about the technology and more proactive in protecting personal data. Even when the IoT health care system itself isn't compromised, the care receivers can be the casualties of overzealous enterprises that have questionable use of patient data with potential legal ramifications, as medical data in numerous countries is protected by law.

Complete Chapter List

Search this Book:
Reset