2019 17th International Conference on Privacy, Security and Trust (PST) 2019
DOI: 10.1109/pst47121.2019.8949052
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Security and Privacy of Next-Generation Edge Computing Technologies

Abstract: The advent of high performance fog and edge computing and high bandwidth connectivity has brought about changes to Internet-of-Things (IoT) service architectures, allowing for greater quantities of high quality information to be extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 18 publications
(18 reference statements)
0
9
0
Order By: Relevance
“…Examples include Arm TrustZone, Intel SGX, Hex-Five MultiZone Security etc. The mass deployment and adoption of mobile and edge computing fuelled data-driven value business models [4], [11], [12]. This tremendously increased the threat landscape and by increasing the attack surface of these platforms [6], [7].…”
Section: Evolution Of Embedded Platform Securitymentioning
confidence: 99%
See 4 more Smart Citations
“…Examples include Arm TrustZone, Intel SGX, Hex-Five MultiZone Security etc. The mass deployment and adoption of mobile and edge computing fuelled data-driven value business models [4], [11], [12]. This tremendously increased the threat landscape and by increasing the attack surface of these platforms [6], [7].…”
Section: Evolution Of Embedded Platform Securitymentioning
confidence: 99%
“…The reliance on intelligent computing technologies has grown opportunities for adversaries to conduct malicious activities, steal valuable data, launch attacks and compromise public and private digital services [1], [2], [3], [4]. The international government agencies have released cybersecurity regulations [5] to manage such challenges by advocating businesses and technology manufacturers to comply and adhere to these regulations.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations