A survey on various security protocols of edge computing
Đã lưu trong:
| Xuất bản năm: | The Journal of Supercomputing vol. 81, no. 1 (Jan 2025), p. 310 |
|---|---|
| Tác giả chính: | |
| Tác giả khác: | , , |
| Được phát hành: |
Springer Nature B.V.
|
| Những chủ đề: | |
| Truy cập trực tuyến: | Citation/Abstract Full Text Full Text - PDF |
| Các nhãn: |
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3256609876 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 0920-8542 | ||
| 022 | |a 1573-0484 | ||
| 024 | 7 | |a 10.1007/s11227-024-06678-6 |2 doi | |
| 035 | |a 3256609876 | ||
| 045 | 2 | |b d20250101 |b d20250131 | |
| 100 | 1 | |a Bhattacharya, Tathagata |u Auburn University at Montgomery, Montgomery, USA (GRID:grid.427550.1) (ISNI:0000 0000 8933 3784) | |
| 245 | 1 | |a A survey on various security protocols of edge computing | |
| 260 | |b Springer Nature B.V. |c Jan 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a Edge computing has emerged as a transformative data processing method by decentralizing computations and bringing them toward the data source, significantly reducing latency and enhancing response times. However, this shift introduces unique security challenges, especially within the detection and prevention of cyberattacks. This paper gives a comprehensive evaluation of the edge security landscape in peripheral computing, with specialized expertise in identifying and mitigating various types of attacks. We explore the challenges associated with detecting and preventing attacks in edge computing environments, acknowledging the limitations of existing approaches. One of the very interesting novelties that we include in this survey article is, that we designed a Web application that runs on an edge network and simulates SQL injection attacks-a common threat in edge computing. Through this simulation, we examined every one of the cleanup strategies used to discover and prevent such attacks using input sanitization techniques, ensuring that the malicious SQL code turned neutralized. Our studies contribute to deeper know-how of the security landscape in edge computing by providing meaningful insights into the effectiveness of multiple prevention strategies. | |
| 653 | |a Computer centers | ||
| 653 | |a Software | ||
| 653 | |a Data integrity | ||
| 653 | |a Data processing | ||
| 653 | |a Infrastructure | ||
| 653 | |a Edge computing | ||
| 653 | |a Applications programs | ||
| 653 | |a Communication | ||
| 653 | |a Bandwidths | ||
| 653 | |a Real time | ||
| 653 | |a Confidentiality | ||
| 653 | |a Sensors | ||
| 653 | |a Decision making | ||
| 653 | |a Data encryption | ||
| 653 | |a Cloud computing | ||
| 653 | |a Data transmission | ||
| 653 | |a Access control | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Internet of Things | ||
| 653 | |a Efficiency | ||
| 653 | |a Distributed processing | ||
| 653 | |a Query languages | ||
| 700 | 1 | |a Peddi, Adithya Vardhan |u Auburn University at Montgomery, Montgomery, USA (GRID:grid.427550.1) (ISNI:0000 0000 8933 3784) | |
| 700 | 1 | |a Ponaganti, Srikanth |u Auburn University at Montgomery, Montgomery, USA (GRID:grid.427550.1) (ISNI:0000 0000 8933 3784) | |
| 700 | 1 | |a Veeramalla, Sai Teja |u Auburn University at Montgomery, Montgomery, USA (GRID:grid.427550.1) (ISNI:0000 0000 8933 3784) | |
| 773 | 0 | |t The Journal of Supercomputing |g vol. 81, no. 1 (Jan 2025), p. 310 | |
| 786 | 0 | |d ProQuest |t Advanced Technologies & Aerospace Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3256609876/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/3256609876/fulltext/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3256609876/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |