ITS 532 - Edge Computing: Concepts, Advantages, and Security Risks

Verified

Added on  2023/04/21

|4
|512
|250
Essay
AI Summary
This essay provides an overview of edge computing, a technology where computing nodes are distributed at the network's edge to enhance user reach, particularly in Internet of Things (IoT) applications. It contrasts edge computing with cloud computing, highlighting that edge computing utilizes cloud technology to enable remote device control. The essay addresses the privacy and security challenges associated with edge computing, such as data breaches, and emphasizes the need for robust risk management systems to protect user data. It concludes that while edge computing offers convenience, careful consideration of security and privacy is essential for its successful deployment.
Document Page
Running Head: EDGE COMPUTING
Edge Computing
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1EDGE COMPUTING
Introduction
Edge computing is a recently developed technology where the computing nodes inside a
cloud are distributed on the technological “edge” for better reach to the users. This new
technology is extensively used in the “Internet of Things” in which various technical devices can
be controlled by a user using cloud computing.
In this essay, the concept of edge computing is discussed along with its security and
privacy systems.
Discussion on Edge Computing
Concept of Edge Computing
Edge Computing is a concept in which the data and applications that are generally stored
in the central nodes of a cloud are distributed across the edge of the entire network (Shi, Cao, Li
& Xu, 2016). As a result, the cloud is able to find more practical applications, especially in the
new technologies that are being developed.
Edge v/s Cloud Computing
Cloud computing is the technology in which data and information can be hosted and
stored online without the need for any physical storage device. On the other hand, edge
computing utilizes the cloud technology to enable the users to control various devices from a
remote location. Thus, cloud computing is the main technology and edge computing is one of the
major applications of edge computing.
Document Page
2EDGE COMPUTING
Privacy and Security on Edge
Edge computing has considerable privacy and security challenges as the data and
information are pushed towards the user end of network. Cloud computing itself has a lot of
security and privacy challenges that are amplified for the case of edge computing. Data breach is
relatively easy in edge computing and an unethical hacker can easily steal the personal
information of the user (Hu, Patel, Sabella, Sprecher & Young, 2015). Furthermore, it is also not
easy to control the data from external attacks as the data is distributed along the entire network.
Conclusion
Edge computing is finding extensive use due to increasing popularity of internet of
things. Cloud computing is effectively deployed to develop the edge systems that are very
convenient for the users. However, considering the security and privacy challenges, suitable risk
management system must be developed for the edge computing in order to protect the data and
information of the users.
Document Page
3EDGE COMPUTING
References
Hu, Y. C., Patel, M., Sabella, D., Sprecher, N., & Young, V. (2015). Mobile edge computing—A
key technology towards 5G. ETSI white paper, 11(11), 1-16.
Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge computing: Vision and
challenges. IEEE Internet of Things Journal, 3(5), 637-646.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]