Review Article Open Access
Security of Edge Computing: Risks and Countermeasures
Abstract
The burgeoning paradigm of edge computing presents a transformative shift in the landscape of data processing and storage by bringing computation closer to the data source. However, this decentralization introduces a host of security challenges that necessitate comprehensive evaluation and mitigation strategies. This abstract explores the inherent risks associated with edge computing, including increased attack surfaces, limited resources for robust security measures, and potential vulnerabilities arising from the dynamic and distributed nature of edge devices. The document further elucidates an array of countermeasures, encompassing secure communication protocols, edge device authentication mechanisms, and resilient intrusion detection systems, to fortify the security posture of edge computing environments. By addressing these concerns, organizations can foster the widespread adoption of edge computing while ensuring the confidentiality, integrity, and availability of critical data in this evolving computing paradigm.
Udaykiran Chinthala*, Asadi Srinivasulu
To read the full article Download Full Article