Edge Computing

Verified

Added on  2023/04/21

|4
|512
|250
AI Summary
This essay discusses the concept of edge computing and its security and privacy systems. It explores the differences between edge computing and cloud computing, as well as the challenges in privacy and security. Suitable risk management systems are also suggested to protect user data and information.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: EDGE COMPUTING
Edge Computing
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1EDGE COMPUTING
Introduction
Edge computing is a recently developed technology where the computing nodes inside a
cloud are distributed on the technological “edge” for better reach to the users. This new
technology is extensively used in the “Internet of Things” in which various technical devices can
be controlled by a user using cloud computing.
In this essay, the concept of edge computing is discussed along with its security and
privacy systems.
Discussion on Edge Computing
Concept of Edge Computing
Edge Computing is a concept in which the data and applications that are generally stored
in the central nodes of a cloud are distributed across the edge of the entire network (Shi, Cao, Li
& Xu, 2016). As a result, the cloud is able to find more practical applications, especially in the
new technologies that are being developed.
Edge v/s Cloud Computing
Cloud computing is the technology in which data and information can be hosted and
stored online without the need for any physical storage device. On the other hand, edge
computing utilizes the cloud technology to enable the users to control various devices from a
remote location. Thus, cloud computing is the main technology and edge computing is one of the
major applications of edge computing.
Document Page
2EDGE COMPUTING
Privacy and Security on Edge
Edge computing has considerable privacy and security challenges as the data and
information are pushed towards the user end of network. Cloud computing itself has a lot of
security and privacy challenges that are amplified for the case of edge computing. Data breach is
relatively easy in edge computing and an unethical hacker can easily steal the personal
information of the user (Hu, Patel, Sabella, Sprecher & Young, 2015). Furthermore, it is also not
easy to control the data from external attacks as the data is distributed along the entire network.
Conclusion
Edge computing is finding extensive use due to increasing popularity of internet of
things. Cloud computing is effectively deployed to develop the edge systems that are very
convenient for the users. However, considering the security and privacy challenges, suitable risk
management system must be developed for the edge computing in order to protect the data and
information of the users.
Document Page
3EDGE COMPUTING
References
Hu, Y. C., Patel, M., Sabella, D., Sprecher, N., & Young, V. (2015). Mobile edge computing—A
key technology towards 5G. ETSI white paper, 11(11), 1-16.
Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge computing: Vision and
challenges. IEEE Internet of Things Journal, 3(5), 637-646.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]