2020
DOI: 10.1109/access.2020.2989456
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities

Abstract: Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Many researchers have reviewed security and privacy issues in edge computing, but not all have fully investiga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 54 publications
(29 citation statements)
references
References 95 publications
0
21
0
1
Order By: Relevance
“…The IoD applications can perform computation locally and offload complex computations to the edge/fog nodes, resulting in more accurate and reliable results. This significantly reduced latency, provide tremendous real-time data analysis, decreased computational cost, and increased scalability and overall quality of service [19].…”
Section: B Technological Advancement Of the Internet Of Drones Paradigmmentioning
confidence: 99%
See 2 more Smart Citations
“…The IoD applications can perform computation locally and offload complex computations to the edge/fog nodes, resulting in more accurate and reliable results. This significantly reduced latency, provide tremendous real-time data analysis, decreased computational cost, and increased scalability and overall quality of service [19].…”
Section: B Technological Advancement Of the Internet Of Drones Paradigmmentioning
confidence: 99%
“…The class of attacks on security and privacy requirements on the IoD network will be explored in this section. Security and privacy requirements are the capabilities and functions employed in eliminating threats and vulnerabilities [19]. Such requirements on the Internet of Drones (IoD) include integrity, availability, authenticity, confidentiality, and privacy.…”
Section: On Security and Privacy Requirements On The Internet Of Dronesmentioning
confidence: 99%
See 1 more Smart Citation
“…Roman et al [3] analyzed the security threats, research challenges, and mechanisms inherited by all edge computing archetypes, meanwhile pointing out the potential interactions and functions to integrate security mechanisms in edge paradigms. Yahuza et al [26] investigated existing works and highlighted different categories of privacy and security threats and state-of-the-art technologies for the curtailment of different security threats. They also summarized different metrics to evaluate the performance of these techniques, classified different attacks, and presented some technical trends in alleviating these attacks.…”
Section: B Related Workmentioning
confidence: 99%
“…En general se establecen diferentes nodos interconectados que mantienen la conectividad, con el fin de disminuir el ancho de banda re-querido y así acelerar la respuesta de las aplicaciones para lograr una experiencia en tiempo real. Este paradigma de computación, advierte retos de seguridad y control que deberán asegurarse de cara a su incorporación y soporte en el futuro (Yahuza et al, 2020;Tozzi, 20-20).…”
Section: Estrategia De Toleranciaunclassified