This article discusses the security challenges posed by edge and cloud computing, including multi-tenancy, complex hierarchy of roles, data segregation, data recovery, and privacy issues. The paper suggests potential solutions to mitigate these threats.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head:SECURITY CHALLENGES AT THE EDGE AND IN THE CLOUD SECURITY CHALLENGES AT THE EDGE AND IN THE CLOUD Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1SECURITY CHALLENGES AT THE EDGE AND IN THE CLOUD Table of Contents Introduction................................................................................................................................2 Challenges..................................................................................................................................2 Multi tenancy.........................................................................................................................2 Multi-site & Multi-technology...............................................................................................3 Complex hierarchy of roles/responsibilities...........................................................................3 Data segregation.....................................................................................................................4 Data recovery.........................................................................................................................4 Privacy issue...........................................................................................................................5 Summary....................................................................................................................................5 References..................................................................................................................................7
2SECURITY CHALLENGES AT THE EDGE AND IN THE CLOUD Introduction Different modes of technologies are simplifying the frequent operations that are being carried out every day. The technologies in discussion are edge computing and cloud computing.Edgecomputingreferstothedistributedcomputingparadigm,initthe computational is completely or largely dependent on the distributed devices nodes (Shi et al., 2016). The discussed distributed devices nodes are referred to as smart devices or edge devices. On, the contrary, the computational operations in cloud are carried out in a centralised device (Rittinghouse & Ransome, 2016). Both of the computing modes have their advantages however, in the discussed paper the attention has been posed to the security challenges posed by the technologies in discussion. Challenges Multi tenancy Multi-tenancy refers to the mode of software operation where different independent instances of individual or multiple applications operates under a shared environment. Both the cloud and edge computing offer this mode (Tang, Sandhu & Li, 2015). The first and foremost risk of having a shared paradigm is the threat of data isolation and interference. The data that belongs to one user may be accessed by the other and furthermore, an overload situation developed by one user may interfere with the data and work of the other user which is undesirable. Additionally, the maintenance and change management of one user may cite adverse impact on the other which is a challenge (Rittinghouse & Ransome, 2016). The attacks such as DDoS (Distributed Denial of Services), Man-in-the middle) and others are can also spread in a shared environment either from one user to others or by one user to others.
3SECURITY CHALLENGES AT THE EDGE AND IN THE CLOUD Hence, it would be justified to state that the security of multi-tenancy is one of the most prominent challenge at the edge and in the cloud computing services. One of the potential solution to the discussed threat is introduction of internal security by the users. Multi-site & Multi-technology Multi-site computing refers to the computing services that is distributed in several single sites or data centers, which is offered by same or different providers and is accessible for the service users.The multi-site capability of the computing services is vulnerable to different attacks and the most prominent of them is the traffic management that is if one site is facing excessive traffic others will be affected as well. The traffic will expose all the sites to different attacks (Wadhwa & Gupta, 2015). Furthermore, no individual site entertains enough freedom to ensure their own security. The attacks are motivated by the lack of speed due to the traffic. Multi-technology also accordingly poses the security threat where if one technology is vulnerable to a specific attack it will compromise the security of different attacks. Hence, to summarise it can be stated that the multi-site security challenge of the computing services is due to excessive traffic and accordingly low speed. While multi- technology security threat is posed by the inter-connection between the technologies that co- exist within a computing service as part of the cloud or at the edge. Complex hierarchy of roles/responsibilities The complexity of hierarchy of roles/ responsibilities is done to ensure a high level of security for the users. The user (mostly organisation) of a computing service has different level of authentication and at the top level of the hierarchy is the governing entities such as owners, IT head and others. The second level is consumed by the managers followed by project heads and so on (Stojmenovic & Wen, 2014). Another notable fact is that with each
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4SECURITY CHALLENGES AT THE EDGE AND IN THE CLOUD descending hierarchical level the control of the applications gets restricted. It is done to ensure that no misuse of the system or applications is done. However, in circumstantial situation when the top tier of the hierarchy is not available it is difficult to prevent a kinetic attack (Yi, Qin & Li, 2015). Furthermore, little aware and less knowledgeable top tier hierarchy also compromises the security of the application and its users. Hence, in summary the security threat due to complex hierarchy exists because of the top tier of the hierarchy. Data segregation As discussed in the section above that in the online computing services that the accessibilityofdataandapplicationsislimitedaccordingtotherolesoftheuser’s stakeholders. The threats of security exists as discussed in the section above. Furthermore, in terms of data the security threat can further be extended if the authentication of the top tiers is stolen or they are restricted from accessing the systems and data (Rao & Selvamani, 2015). In thediscussedscenario,thedatacanbestolen,stalked,manipulatedorsimilarother challenges may exist. Additionally, if one of the top tiers decides to go rogue it will cite adverse impact on the threat of the whole user and its hierarchy. Therefore, to summarise it can be stated that the data segregation security threat exists due to the top tier and their awareness about the system and applications that they are using. Data recovery One of the most prominent benefits of the online computing services is the ease of the data recovery offered by it. However, the data recovery process over the online computing services can be compromised through the attacks such as DDoS and Man-in-the–middle (Ramachandran & Chang, 2016). The DDoS attacks restricts the user from accessing the system while on the contrary, the man-in-the-middle attack can be used for compromising the
5SECURITY CHALLENGES AT THE EDGE AND IN THE CLOUD data in the data recovery process. Other attacks such as deployment of malwares can be done in the process as well. The discussed deployment of the malwares can even compromise the whole network if proper attaention is not cited. So, the data recovery process is vulnerable to certain attacks and adoption of encryption and cryptographic transfer can mitigate the threat. Privacy issue Privacy is the basic right of every individual or organisation and a compromised network can pose threat to it. It has been identified from the discussions above that the data stored on the online computing platforms are at risk and the discussed data may include personal data risking the privacy of the users and its stakeholders (Rao & Selvamani, 2015). The organisations are using online computing services for the Human Resource Management (HRM) services. The HRM tools store all the personal data of the employees and in case of a data leakage or theft; the personal data of the users are compromised, that eventually poses threattotheprivacyoftheorganisationalemployees(GarciaLopezetal.,2015). Furthermore, the leakage of the organisational data also pose threat to the organisational strategic and work pattern along with some confidential documents which pose threat to the privacy of the firm. Therefore, to conclude it would be justified to state that the privacy of the user and its stakeholders at edge and in cloud are at threat due to the attacks that are directed towards the data leakage or theft. Summary The findings of the paper have cited that the security threat at edge and in cloud are extensive which extends from low level to top. The findings of the paper have revealed that the security of multi-tenancy is one of the most prominent challenge at the edge and in the
6SECURITY CHALLENGES AT THE EDGE AND IN THE CLOUD cloud computing services. Furthermore, the multi-site security challenge of the computing services is due to excessive traffic and accordingly low speed. While multi-technology security threat is posed by the inter-connection between the technologies that co-exist within a computing service as part of the cloud or at the edge. Another notable finding from the paper is that the security threat due to complex hierarchy exists because of the top tier of the hierarchy. Data segregation and data recovery also pose threat to the security and privacy of the users. Therefore, in conclusion the need for security measures at edge and in cloud is very crucial and needs to be identified direly.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7SECURITY CHALLENGES AT THE EDGE AND IN THE CLOUD References Garcia Lopez, P., Montresor, A., Epema, D., Datta, A., Higashino, T., Iamnitchi, A., ... & Riviere, E. (2015). Edge-centric computing: Vision and challenges.ACM SIGCOMM Computer Communication Review,45(5), 37-42. Ramachandran, M., & Chang, V. (2016). Towards performance evaluation of cloud service providers for cloud data security.International Journal of Information Management, 36(4), 618-625. Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing.Procedia Computer Science,48, 204-209. Rittinghouse,J.W.,&Ransome,J.F.(2016).Cloudcomputing:implementation, management, and security. CRC press. Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge computing: Vision and challenges. IEEE Internet of Things Journal,3(5), 637-646. Stojmenovic, I., & Wen, S. (2014, September). The fog computing paradigm: Scenarios and security issues. InComputer Science and Information Systems (FedCSIS), 2014 Federated Conference on(pp. 1-8). IEEE. Tang, B., Sandhu, R., & Li, Q. (2015). Multi‐tenancy authorization models for collaborative cloud services.Concurrency and Computation: Practice and Experience,27(11), 2851-2868. Wadhwa, A. V., & Gupta, S. (2015). Study of Security Issues in Cloud Computing. International Journal of Computer Science and Mobile Computing IJCSMC,4(6), 230-234.
8SECURITY CHALLENGES AT THE EDGE AND IN THE CLOUD Yi, S., Qin, Z., & Li, Q. (2015, August). Security and privacy issues of fog computing: A survey. InInternational conference on wireless algorithms, systems, and applications (pp. 685-695). Springer, Cham.