Constructive Solutions for Security and Privacy Issues at the Edge: Securing Edge Framework – A Healthcare Application Use Case

Constructive Solutions for Security and Privacy Issues at the Edge: Securing Edge Framework – A Healthcare Application Use Case

Indra Priyadharshini S., Pradheeba Ulaganathan, Vigilson Prem M., Yuvaraj B. R.
Copyright: © 2021 |Pages: 35
ISBN13: 9781799848738|ISBN10: 1799848736|ISBN13 Softcover: 9781799858294|EISBN13: 9781799848745
DOI: 10.4018/978-1-7998-4873-8.ch012
Cite Chapter Cite Chapter

MLA

S., Indra Priyadharshini, et al. "Constructive Solutions for Security and Privacy Issues at the Edge: Securing Edge Framework – A Healthcare Application Use Case." Cases on Edge Computing and Analytics, edited by Paranthaman Ambika, et al., IGI Global, 2021, pp. 235-269. https://doi.org/10.4018/978-1-7998-4873-8.ch012

APA

S., I. P., Ulaganathan, P., M., V. P., & B. R., Y. (2021). Constructive Solutions for Security and Privacy Issues at the Edge: Securing Edge Framework – A Healthcare Application Use Case. In P. Ambika, A. Donald, & A. Kumar (Eds.), Cases on Edge Computing and Analytics (pp. 235-269). IGI Global. https://doi.org/10.4018/978-1-7998-4873-8.ch012

Chicago

S., Indra Priyadharshini, et al. "Constructive Solutions for Security and Privacy Issues at the Edge: Securing Edge Framework – A Healthcare Application Use Case." In Cases on Edge Computing and Analytics, edited by Paranthaman Ambika, A. Cecil Donald, and A. Dalvin Vinoth Kumar, 235-269. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-4873-8.ch012

Export Reference

Mendeley
Favorite

Abstract

The evolution in computing strategies has shown wonders in reducing the reachability issue among different end devices. After centralized approaches, decentralized approaches started to take action, but with the latency in data pre-processing, computing very simple requests was the same as for the larger computations. Now it's time to have a simple decentralized environment called edge that is created very near to the end device. This makes edge location friendly and time friendly to different kinds of devices like smart, sensor, grid, etc. In this chapter, some of the serious and non-discussed security issues and privacy issues available on edge are explained neatly, and for a few of the problems, some solutions are also recommended. At last, a separate case study of edge computing challenges in healthcare is also explored, and solutions to those issues concerning that domain are shown.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.