Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Encryption for edge computing applications

View through CrossRef
As smart sensors and the Internet of Things (IoT) exponentially expand, there is an increased need for effective processing solutions for sensor node data located in the operational arena where it can be leveraged for immediate decision support. Current developments reveal that edge computing, where processing and storage are performed close to data generation locations, can meet this need (Ahmed and Ahmed 2016). Edge computing imparts greater flexibility than that experienced in cloud computing architectures (Khan et al. 2019). Despite these benefits, the literature highlights open security issues in edge computing, particularly in the realm of encryption. A prominent limitation of edge devices is the hardware’s ability to support the computational complexity of traditional encryption methodologies (Alwarafy et al. 2020). Furthermore, encryption on the edge poses challenges in key management, the process by which cryptographic keys are transferred and stored among devices (Zeyu et al. 2020). Though edge computing provides reduced latency in data processing, encryption mechanism utilization reintroduces delay and can hinder achieving real-time results (Yu et al. 2018). The IoT is composed of a wide range of devices with a diverse set of computational capabilities, rendering a homogeneous solution for encryption impractical (Dar et al. 2019). Edge devices are often deployed in operational locations that are vulnerable to physical tampering and attacks. Sensitive data may be compromised if not sufficiently encrypted or if keys are not managed properly. Furthermore, the distributed nature and quantity of edge devices create a vast attack surface that can be compromised in other ways (Xiao et al. 2019). Understanding established mechanisms and exploring emerging methodologies for encryption reveals potential solutions for developing a robust solution for edge computing applications. The purpose of this document is to detail the current research for encryption methods in the edge computing space and highlight the major challenges associated with executing successful encryption on the edge.
Engineer Research and Development Center (U.S.)
Title: Encryption for edge computing applications
Description:
As smart sensors and the Internet of Things (IoT) exponentially expand, there is an increased need for effective processing solutions for sensor node data located in the operational arena where it can be leveraged for immediate decision support.
Current developments reveal that edge computing, where processing and storage are performed close to data generation locations, can meet this need (Ahmed and Ahmed 2016).
Edge computing imparts greater flexibility than that experienced in cloud computing architectures (Khan et al.
2019).
Despite these benefits, the literature highlights open security issues in edge computing, particularly in the realm of encryption.
A prominent limitation of edge devices is the hardware’s ability to support the computational complexity of traditional encryption methodologies (Alwarafy et al.
2020).
Furthermore, encryption on the edge poses challenges in key management, the process by which cryptographic keys are transferred and stored among devices (Zeyu et al.
2020).
Though edge computing provides reduced latency in data processing, encryption mechanism utilization reintroduces delay and can hinder achieving real-time results (Yu et al.
2018).
The IoT is composed of a wide range of devices with a diverse set of computational capabilities, rendering a homogeneous solution for encryption impractical (Dar et al.
2019).
Edge devices are often deployed in operational locations that are vulnerable to physical tampering and attacks.
Sensitive data may be compromised if not sufficiently encrypted or if keys are not managed properly.
Furthermore, the distributed nature and quantity of edge devices create a vast attack surface that can be compromised in other ways (Xiao et al.
2019).
Understanding established mechanisms and exploring emerging methodologies for encryption reveals potential solutions for developing a robust solution for edge computing applications.
The purpose of this document is to detail the current research for encryption methods in the edge computing space and highlight the major challenges associated with executing successful encryption on the edge.

Related Results

Magic graphs
Magic graphs
DE LA TESIS<br/>Si un graf G admet un etiquetament super edge magic, aleshores G es diu que és un graf super edge màgic. La tesis està principalment enfocada a l'estudi del c...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Product of digraphs, (super) edge-magic valences and related problems
Product of digraphs, (super) edge-magic valences and related problems
Discrete Mathematics, and in particular Graph Theory, has gained a lot of popularity during the last 7 decades. Among the many branches in Graph Theory, graph labelings has experim...
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathem...
Control the Sensitivity of the Encryption Key to Ensure the Security of Big Data
Control the Sensitivity of the Encryption Key to Ensure the Security of Big Data
With the increasing technological development that has led to the complexity of big data systems, the importance lies in the challenge that ensures the security of sensitive inform...

Back to Top