2022
DOI: 10.22214/ijraset.2022.41862
|View full text |Cite
|
Sign up to set email alerts
|

Cloud, Fog and Edge Computing: Security and Privacy Concerns

Abstract: The use of different cloud computing technologies increased with the rise of 5G technology and IoT. Cloud computing also enabled intense data processing and warehousing. Data storage in the cloud comes with several issues and security concerns. Moreover, when the volume of data created by every device increases, the conventional cloud computing architecture fails to address concerns such as excessive latency, bandwidth limits, and resource constraints. As a result, new computational paradigms such as edge and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…Side Channel attacks attempt to exploit a system by gathering publicly available information to deduce sensitive private information (Patil et al, 2020). Communication protocols and embedded sensors are popular side channels in edge computing systems (Xiao et al, 2019).…”
Section: Side Channel Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Side Channel attacks attempt to exploit a system by gathering publicly available information to deduce sensitive private information (Patil et al, 2020). Communication protocols and embedded sensors are popular side channels in edge computing systems (Xiao et al, 2019).…”
Section: Side Channel Attacksmentioning
confidence: 99%
“…Edge nodes are thus vulnerable to cyber-attacks. Other issues that arise as a result of the use of legacy systems include the management and deployment of updates, which include security updates (Patil et al, 2020). Change and vulnerability management should be employed to better prepare for attacks and manage vulnerabilities of legacy systems.…”
Section: Legacy Systemsmentioning
confidence: 99%
“…The paper discusses cloud computing, proposed taxonomy and furnishes an in-depth analysis of how security, privacy, application, and communication challenges feature in the scholarly contributions. [79] 2022 This paper presents a list of security and privacy in fog computing paradigm. It also expounds dangers that exist in cloud, fog and edge computing paradigms.…”
Section: Fogmentioning
confidence: 99%
“…The security frameworks for both cloud and edge computing are crucial as they process sensitive data. Patil et al (2022) highlight the security and privacy issues inherent in cloud, fog, and edge computing paradigms. With the rise of 5G technology and IoT, the use of cloud computing has increased, but so have the security challenges.…”
Section: Security Concerns In Data Storage: Cloud Vs Edgementioning
confidence: 99%
“…Unlike cloud computing, where data is centralized, edge computing distributes data storage across numerous locations, increasing the risk of unauthorized access and data breaches. Patil et al (2022) further elaborate on the security challenges in cloud and edge computing, including issues related to data encryption, confidentiality, and data packet splitting. These challenges are critical in ensuring the integrity and privacy of data stored and processed in these environments.…”
Section: Security Concerns In Data Storage: Cloud Vs Edgementioning
confidence: 99%