Data Security and Privacy Requirements in Edge Computing: A Systemic Review

Chinnasamy P. (Sri Shakthi Institute of Engineering and Technology, India), Rojaramani D. (Sethu Institute of Technology, India), Praveena V. (Dr. N. G. P. Institute of Technology, India), Annlin Jeba S. V. (Sree Buddha College of Engineering, India) and Bensujin B. (University of Technology and Applied Sciences, Nizwa, Oman)
Copyright: © 2021 |Pages: 187
EISBN13: 9781799885740|DOI: 10.4018/978-1-7998-4873-8.ch009
OnDemand PDF Download:
OnDemand PDF Download
Download link provided immediately after order completion


Several researchers analyzed the information security problems in edge computing, though not all studied the criteria for security and confidentiality in detail. This chapter intends to extensively evaluate the edge computing protection and confidentiality standards and the different technical approaches utilized by the technologies often used mitigate the risks. This study describes the latest research and emphasizes the following: (1) the definition of edge computing protection and confidentiality criteria, (2) state-of-the-art strategies used to mitigate protection and privacy risks, (3) developments in technical approaches, (4) measures used to measure the efficiency of interventions, (5) the categorization of threats on the edge device and the related technical pattern used to mitigate the attackers, and (6) research directions for potential professionals in the field of edge devices privacy and security.
InfoSci-OnDemand Powered Search