Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
… challenges in edge computing security, … security of CSL has been extensively studied [16],
[17], in this paper, we mainly explore the security issues of EDL and ESL in edge computing

Survey on multi-access edge computing security and privacy

P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
… In this paper, security is mainly classified under conventional security aspects and MEC
specific security issues as depicted in the Fig. 2. Under conventional or classical security

Survey on edge computing security

H Zeyu, X Geming, W Zhaohang… - … Conference on Big Data …, 2020 - ieeexplore.ieee.org
… of edge computing security, this paper reviews a large number of published papers on edge
computing security … status in the field of edge computing security. Hoping to provide some …

Intelligent edge computing: Security and privacy challenges

M Mukherjee, R Matam… - IEEE …, 2020 - ieeexplore.ieee.org
… and privacy security in edge computing environment in Table 1. Note that the security and
… a need to perform a formal security analysis of any proposed security schemes for intelligent …

Multi-access edge computing architecture, data security and privacy: A review

B Ali, MA Gregory, S Li - IEEE Access, 2021 - ieeexplore.ieee.org
… ABSTRACT Multi-Access Edge Computing (MEC) is an extension of cloud computing that
aims to provide computation, storage, and networking capabilities at the edge of the network in …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
… The state-of-the-art data security and privacy solutions in edge-… directions of data security
in the field of edge computing. … data security and privacy-preserving in edge computing mainly …

An overview of fog computing and edge computing security and privacy issues

AM Alwakeel - Sensors, 2021 - mdpi.com
… cloud computing, edge computing and fog computing and … security of both fog computing
and edge computing and how their unique characteristic highlighted new privacy and security

A survey of edge computing-based designs for IoT security

K Sha, TA Yang, W Wei, S Davari - Digital Communications and Networks, 2020 - Elsevier
… IoT security solutions at the edge layer as well as to inspire more edge-based IoT security
designs. We first present an edge-centric IoT architecture. Then, we extensively review the …

Edge computing perspectives: Architectures, technologies, and open security issues

M Caprolu, R Di Pietro, F Lombardi… - … Computing (EDGE), 2019 - ieeexplore.ieee.org
… the devices used in the Edge and Fog levels, analyzing the … in the context of four typical Edge
Computing real-world use-case … For each use-case, we analyze how the Edge Computing

Survey on edge computing security

BH Husain, S Askar - International Journal of Science and Business, 2021 - ideas.repec.org
Edge computing (EC) as a distributed system of IT that decentralized the power of processing
in which the mobile Internet of Things (IoT) computing … on Edge Computing security and …