A survey on various security protocols of edge computing

Đã lưu trong:
Chi tiết về thư mục
Xuất bản năm:The Journal of Supercomputing vol. 81, no. 1 (Jan 2025), p. 310
Tác giả chính: Bhattacharya, Tathagata
Tác giả khác: Peddi, Adithya Vardhan, Ponaganti, Srikanth, Veeramalla, Sai Teja
Được phát hành:
Springer Nature B.V.
Những chủ đề:
Truy cập trực tuyến:Citation/Abstract
Full Text
Full Text - PDF
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!

MARC

LEADER 00000nab a2200000uu 4500
001 3256609876
003 UK-CbPIL
022 |a 0920-8542 
022 |a 1573-0484 
024 7 |a 10.1007/s11227-024-06678-6  |2 doi 
035 |a 3256609876 
045 2 |b d20250101  |b d20250131 
100 1 |a Bhattacharya, Tathagata  |u Auburn University at Montgomery, Montgomery, USA (GRID:grid.427550.1) (ISNI:0000 0000 8933 3784) 
245 1 |a A survey on various security protocols of edge computing 
260 |b Springer Nature B.V.  |c Jan 2025 
513 |a Journal Article 
520 3 |a Edge computing has emerged as a transformative data processing method by decentralizing computations and bringing them toward the data source, significantly reducing latency and enhancing response times. However, this shift introduces unique security challenges, especially within the detection and prevention of cyberattacks. This paper gives a comprehensive evaluation of the edge security landscape in peripheral computing, with specialized expertise in identifying and mitigating various types of attacks. We explore the challenges associated with detecting and preventing attacks in edge computing environments, acknowledging the limitations of existing approaches. One of the very interesting novelties that we include in this survey article is, that we designed a Web application that runs on an edge network and simulates SQL injection attacks-a common threat in edge computing. Through this simulation, we examined every one of the cleanup strategies used to discover and prevent such attacks using input sanitization techniques, ensuring that the malicious SQL code turned neutralized. Our studies contribute to deeper know-how of the security landscape in edge computing by providing meaningful insights into the effectiveness of multiple prevention strategies. 
653 |a Computer centers 
653 |a Software 
653 |a Data integrity 
653 |a Data processing 
653 |a Infrastructure 
653 |a Edge computing 
653 |a Applications programs 
653 |a Communication 
653 |a Bandwidths 
653 |a Real time 
653 |a Confidentiality 
653 |a Sensors 
653 |a Decision making 
653 |a Data encryption 
653 |a Cloud computing 
653 |a Data transmission 
653 |a Access control 
653 |a Cybersecurity 
653 |a Internet of Things 
653 |a Efficiency 
653 |a Distributed processing 
653 |a Query languages 
700 1 |a Peddi, Adithya Vardhan  |u Auburn University at Montgomery, Montgomery, USA (GRID:grid.427550.1) (ISNI:0000 0000 8933 3784) 
700 1 |a Ponaganti, Srikanth  |u Auburn University at Montgomery, Montgomery, USA (GRID:grid.427550.1) (ISNI:0000 0000 8933 3784) 
700 1 |a Veeramalla, Sai Teja  |u Auburn University at Montgomery, Montgomery, USA (GRID:grid.427550.1) (ISNI:0000 0000 8933 3784) 
773 0 |t The Journal of Supercomputing  |g vol. 81, no. 1 (Jan 2025), p. 310 
786 0 |d ProQuest  |t Advanced Technologies & Aerospace Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3256609876/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3256609876/fulltext/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3256609876/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch