Author
Abstract
Edge computing, as an extension of cloud computing, brings computation and data storage closer to the data source. This shift offers significant advantages in terms of latency reduction, bandwidth optimization, and real-time processing capabilities. By minimizing the distance that data needs to travel, edge computing enhances the performance of applications that require rapid data processing and immediate response times. This is particularly beneficial for Internet of Things (IoT) devices, autonomous vehicles, smart grids, and other applications that demand low-latency interactions. However, the decentralization inherent in edge computing introduces a unique set of cybersecurity challenges that are distinct from those faced in traditional centralized cloud environments. The distributed architecture of edge computing creates numerous points of vulnerability, each of which can be exploited by cyber attackers. Additionally, edge devices often operate with limited computational resources and power, which complicates the implementation of robust security measures. This paper explores the cybersecurity implications of edge computing in the context of data engineering. It begins with a comprehensive review of existing literature to establish the current understanding of edge computing security issues. The review identifies the primary vulnerabilities associated with edge computing, including those related to distributed architecture, data transmission, and resource constraints. Following the literature review, the paper delves into specific security threats that edge computing environments face. These include man-in-the-middle (MitM) attacks, distributed denial-of-service (DDoS) attacks, malware and ransomware, and insider threats. Each threat is analyzed to understand its potential impact on edge computing systems and the data they process.
Suggested Citation
Nithin Reddy Desani, 2024.
"Cybersecurity Implications of Edge Computing in Data Engineering,"
International Journal of Computing and Engineering, CARI Journals Limited, vol. 6(2), pages 24-34.
Handle:
RePEc:bhx:ojijce:v:6:y:2024:i:2:p:24-34:id:2130
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bhx:ojijce:v:6:y:2024:i:2:p:24-34:id:2130. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://www.carijournals.org/journals/index.php/IJCE/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.