This essay discusses the concept of edge computing and its security and privacy systems. It explores the differences between edge computing and cloud computing, as well as the challenges in privacy and security. Suitable risk management systems are also suggested to protect user data and information.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: EDGE COMPUTING Edge Computing Name of the Student Name of the University
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1EDGE COMPUTING Introduction Edge computing is a recently developed technology where the computing nodes inside a cloud are distributed on the technological “edge” for better reach to the users. This new technology is extensively used in the “Internet of Things” in which various technical devices can be controlled by a user using cloud computing. In this essay, the concept of edge computing is discussed along with its security and privacy systems. Discussion on Edge Computing Concept of Edge Computing Edge Computing is a concept in which the data and applications that are generally stored in the central nodes of a cloud are distributed across the edge of the entire network (Shi, Cao, Li & Xu, 2016). As a result, the cloud is able to find more practical applications, especially in the new technologies that are being developed. Edge v/s Cloud Computing Cloud computing is the technology in which data and information can be hosted and stored online without the need for any physical storage device. On the other hand, edge computing utilizes the cloud technology to enable the users to control various devices from a remote location. Thus, cloud computing is the main technology and edge computing is one of the major applications of edge computing.
2EDGE COMPUTING Privacy and Security on Edge Edge computing has considerable privacy and security challenges as the data and information are pushed towards the user end of network. Cloud computing itself has a lot of security and privacy challenges that are amplified for the case of edge computing. Data breach is relatively easy in edge computing and an unethical hacker can easily steal the personal information of the user (Hu, Patel, Sabella, Sprecher & Young, 2015). Furthermore, it is also not easy to control the data from external attacks as the data is distributed along the entire network. Conclusion Edge computing is finding extensive use due to increasing popularity of internet of things. Cloud computing is effectively deployed to develop the edge systems that are very convenient for the users. However, considering the security and privacy challenges, suitable risk management system must be developed for the edge computing in order to protect the data and information of the users.
3EDGE COMPUTING References Hu, Y. C., Patel, M., Sabella, D., Sprecher, N., & Young, V. (2015). Mobile edge computing—A key technology towards 5G.ETSI white paper,11(11), 1-16. Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge computing: Vision and challenges.IEEE Internet of Things Journal,3(5), 637-646.