logo

Security Challenges at the Edge and in the Cloud

   

Added on  2023-05-29

9 Pages1952 Words428 Views
Running Head: SECURITY CHALLENGES AT THE EDGE AND IN THE CLOUD
SECURITY CHALLENGES AT THE EDGE AND IN THE CLOUD
Name of the Student
Name of the University
Author Note
Security Challenges at the Edge and in the Cloud_1
1SECURITY CHALLENGES AT THE EDGE AND IN THE CLOUD
Table of Contents
Introduction................................................................................................................................2
Challenges..................................................................................................................................2
Multi tenancy.........................................................................................................................2
Multi-site & Multi-technology...............................................................................................3
Complex hierarchy of roles/responsibilities...........................................................................3
Data segregation.....................................................................................................................4
Data recovery.........................................................................................................................4
Privacy issue...........................................................................................................................5
Summary....................................................................................................................................5
References..................................................................................................................................7
Security Challenges at the Edge and in the Cloud_2
2SECURITY CHALLENGES AT THE EDGE AND IN THE CLOUD
Introduction
Different modes of technologies are simplifying the frequent operations that are being
carried out every day. The technologies in discussion are edge computing and cloud
computing. Edge computing refers to the distributed computing paradigm, in it the
computational is completely or largely dependent on the distributed devices nodes (Shi et al.,
2016). The discussed distributed devices nodes are referred to as smart devices or edge
devices. On, the contrary, the computational operations in cloud are carried out in a
centralised device (Rittinghouse & Ransome, 2016). Both of the computing modes have their
advantages however, in the discussed paper the attention has been posed to the security
challenges posed by the technologies in discussion.
Challenges
Multi tenancy
Multi-tenancy refers to the mode of software operation where different independent
instances of individual or multiple applications operates under a shared environment. Both
the cloud and edge computing offer this mode (Tang, Sandhu & Li, 2015). The first and
foremost risk of having a shared paradigm is the threat of data isolation and interference. The
data that belongs to one user may be accessed by the other and furthermore, an overload
situation developed by one user may interfere with the data and work of the other user which
is undesirable. Additionally, the maintenance and change management of one user may cite
adverse impact on the other which is a challenge (Rittinghouse & Ransome, 2016). The
attacks such as DDoS (Distributed Denial of Services), Man-in-the middle) and others are can
also spread in a shared environment either from one user to others or by one user to others.
Security Challenges at the Edge and in the Cloud_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security challenges Assignment PDF
|9
|1882
|24

DATA SECURITY IN CLOUD COMPUTING.
|10
|253
|29

Edge Computing
|4
|512
|250

Multitenancy in Cloud Computing
|6
|2861
|29

Management Assignment - Products and Their Uses
|5
|578
|45

Internet of Things for Future of Fog Domain
|4
|474
|43