The Future Development Direction of Cloud-Associated Edge-Computing Security in the Era of 5G as Edge Intelligence

Author:

Devi Odugu Rama1ORCID,Webber Julian2ORCID,Mehbodniya Abolfazl2ORCID,Chaitanya Morsa3ORCID,Jawarkar Parag S.4ORCID,Soni Mukesh5ORCID,Miah Shahajan6ORCID

Affiliation:

1. Department of CSE, Lakireddy Bali Reddy College of Engineering (Autonomous), Mylavaram 521230, NTR District, Andhra Pradesh, India

2. Department of Electronics and Communication Engineering (ECE), Kuwait College of Science and Technology (KCST), Doha, Kuwait

3. Department of Computer Applications, R. V. R & J. C College of Engineering, Guntur, Andhra Pradesh, India

4. Department of Electronics Engineering, Shri Ramdeobaba College of Engineering and Management, Nagpur, Maharashtra, India

5. Department of CSE, University Centre for Research & Development Chandigarh University, Mohali 140413, Punjab, India

6. Department of EEE, Bangladesh University of Business and Technology, Dhaka, Bangladesh

Abstract

By introducing the Internet-of-Everything, new usage situations such as self-directed movement and vivid competitions constructed upon Virtual Reality or Augmented Reality expertise, besides the Industrial-Internet-of-Thing, accelerates the initial growth of edge-registering improvements. The global versatile correspondence business is now developing toward 5G. Edge processing has gotten a lot of attention around the globe as 5G is one of the major access enhancements to advance the huge scope organization of edge registration. Edge processing security has been a significant area of concern since the advent of edge registers, limiting its execution and enhancement. Edge figuring security has been greatly hampered by the innovative structures of edge-registering, the reconciliation with a huge number of innovations, the innovative usage conditions carried on through edge-processing, and common growing requirements aimed at safety insurance. This report examines the ebb and flow of examination anxiously registering security research. This article highlights the security issues of edge processing from five perspectives, including network access, key administration, protection assurance, assault mitigation, and irregularity identification, by breaking down the safety tests among edge-registering cutting-edge terms of innovative representations, and novel applications situations, as well as innovation conditions. The study separately discusses the scholastic community’s exploratory accomplishments among the applied domains, as well as the compensations for the drawbacks. In conclusion, the upcoming expansion track toward edge-computing safety has been conferred as well as projected, combining edge-cloud coordinated effort and edge intelligence.

Publisher

Hindawi Limited

Subject

Computer Science Applications,Software

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Implementing Convolutional Neural Networks for Automated Disease Diagnosis in Telemedicine;2024 Third International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE);2024-04-26

2. Real-Time Anomaly Detection in 5G Networks Through Edge Computing;2024 Third International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS);2024-03-14

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3