Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications

The advent of MEC (Multi-access Edge Computing), as a natural evolution of cloud computing, can enable innovative services and applications, with many opportunities for end users. Hosting applications at the edge could also address privacy and security issues inherent to the traditional cloud-based...

Full description

Saved in:
Bibliographic Details
Main Authors: Dario Sabella, Kishen Maloor, Ned Smith, Michaela Vanderveen, Akis Kourtis
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10767241/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1846123639523508224
author Dario Sabella
Kishen Maloor
Ned Smith
Michaela Vanderveen
Akis Kourtis
author_facet Dario Sabella
Kishen Maloor
Ned Smith
Michaela Vanderveen
Akis Kourtis
author_sort Dario Sabella
collection DOAJ
description The advent of MEC (Multi-access Edge Computing), as a natural evolution of cloud computing, can enable innovative services and applications, with many opportunities for end users. Hosting applications at the edge could also address privacy and security issues inherent to the traditional cloud-based deployment model, e.g., keeping regional regulatory compliance. However, shifting workloads to the edge of the network warrants the consideration of new security risks. Separately, the recent specification of MEC federations (as result of the GSMA’s Telco Edge Cloud) underscores the importance of security and trust due to the heterogeneity of edge systems in global MEC deployments. Edge cybersecurity solutions must adopt international standards for interoperability. Accordingly, ETSI MEC has endeavored to study edge security threats and craft solutions, oftentimes based on existing standards from other industry groups. This paper discusses the security challenges that arise from shifting workloads to the edge of the network with particular emphasis on international standards and aims to provide a tutorial for developers and architects to navigate the complexities in achieving edge computing security.
format Article
id doaj-art-8ee71fecb12748e3901aed9bf7d2b94e
institution Kabale University
issn 2169-3536
language English
publishDate 2024-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-8ee71fecb12748e3901aed9bf7d2b94e2024-12-14T00:00:56ZengIEEEIEEE Access2169-35362024-01-011218532818533510.1109/ACCESS.2024.350621210767241Edge Computing Cybersecurity Standards: Protecting Infrastructure and ApplicationsDario Sabella0https://orcid.org/0000-0002-8723-7726Kishen Maloor1https://orcid.org/0009-0000-1896-4666Ned Smith2https://orcid.org/0009-0006-5000-7472Michaela Vanderveen3https://orcid.org/0000-0002-5315-2775Akis Kourtis4https://orcid.org/0000-0002-8356-114XIntel Corporation, Santa Clara, CA, USAIntel Corporation, Santa Clara, CA, USAIntel Corporation, Santa Clara, CA, USAThe MITRE Corporation, McLean, VA, USANational Center for Scientific Research “Demokritos”, Paraskevi, GreeceThe advent of MEC (Multi-access Edge Computing), as a natural evolution of cloud computing, can enable innovative services and applications, with many opportunities for end users. Hosting applications at the edge could also address privacy and security issues inherent to the traditional cloud-based deployment model, e.g., keeping regional regulatory compliance. However, shifting workloads to the edge of the network warrants the consideration of new security risks. Separately, the recent specification of MEC federations (as result of the GSMA’s Telco Edge Cloud) underscores the importance of security and trust due to the heterogeneity of edge systems in global MEC deployments. Edge cybersecurity solutions must adopt international standards for interoperability. Accordingly, ETSI MEC has endeavored to study edge security threats and craft solutions, oftentimes based on existing standards from other industry groups. This paper discusses the security challenges that arise from shifting workloads to the edge of the network with particular emphasis on international standards and aims to provide a tutorial for developers and architects to navigate the complexities in achieving edge computing security.https://ieeexplore.ieee.org/document/10767241/5Gedge computingedge nativeMECcybersecurity
spellingShingle Dario Sabella
Kishen Maloor
Ned Smith
Michaela Vanderveen
Akis Kourtis
Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications
IEEE Access
5G
edge computing
edge native
MEC
cybersecurity
title Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications
title_full Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications
title_fullStr Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications
title_full_unstemmed Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications
title_short Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications
title_sort edge computing cybersecurity standards protecting infrastructure and applications
topic 5G
edge computing
edge native
MEC
cybersecurity
url https://ieeexplore.ieee.org/document/10767241/
work_keys_str_mv AT dariosabella edgecomputingcybersecuritystandardsprotectinginfrastructureandapplications
AT kishenmaloor edgecomputingcybersecuritystandardsprotectinginfrastructureandapplications
AT nedsmith edgecomputingcybersecuritystandardsprotectinginfrastructureandapplications
AT michaelavanderveen edgecomputingcybersecuritystandardsprotectinginfrastructureandapplications
AT akiskourtis edgecomputingcybersecuritystandardsprotectinginfrastructureandapplications