Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications
The advent of MEC (Multi-access Edge Computing), as a natural evolution of cloud computing, can enable innovative services and applications, with many opportunities for end users. Hosting applications at the edge could also address privacy and security issues inherent to the traditional cloud-based...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2024-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10767241/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1846123639523508224 |
---|---|
author | Dario Sabella Kishen Maloor Ned Smith Michaela Vanderveen Akis Kourtis |
author_facet | Dario Sabella Kishen Maloor Ned Smith Michaela Vanderveen Akis Kourtis |
author_sort | Dario Sabella |
collection | DOAJ |
description | The advent of MEC (Multi-access Edge Computing), as a natural evolution of cloud computing, can enable innovative services and applications, with many opportunities for end users. Hosting applications at the edge could also address privacy and security issues inherent to the traditional cloud-based deployment model, e.g., keeping regional regulatory compliance. However, shifting workloads to the edge of the network warrants the consideration of new security risks. Separately, the recent specification of MEC federations (as result of the GSMA’s Telco Edge Cloud) underscores the importance of security and trust due to the heterogeneity of edge systems in global MEC deployments. Edge cybersecurity solutions must adopt international standards for interoperability. Accordingly, ETSI MEC has endeavored to study edge security threats and craft solutions, oftentimes based on existing standards from other industry groups. This paper discusses the security challenges that arise from shifting workloads to the edge of the network with particular emphasis on international standards and aims to provide a tutorial for developers and architects to navigate the complexities in achieving edge computing security. |
format | Article |
id | doaj-art-8ee71fecb12748e3901aed9bf7d2b94e |
institution | Kabale University |
issn | 2169-3536 |
language | English |
publishDate | 2024-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj-art-8ee71fecb12748e3901aed9bf7d2b94e2024-12-14T00:00:56ZengIEEEIEEE Access2169-35362024-01-011218532818533510.1109/ACCESS.2024.350621210767241Edge Computing Cybersecurity Standards: Protecting Infrastructure and ApplicationsDario Sabella0https://orcid.org/0000-0002-8723-7726Kishen Maloor1https://orcid.org/0009-0000-1896-4666Ned Smith2https://orcid.org/0009-0006-5000-7472Michaela Vanderveen3https://orcid.org/0000-0002-5315-2775Akis Kourtis4https://orcid.org/0000-0002-8356-114XIntel Corporation, Santa Clara, CA, USAIntel Corporation, Santa Clara, CA, USAIntel Corporation, Santa Clara, CA, USAThe MITRE Corporation, McLean, VA, USANational Center for Scientific Research “Demokritos”, Paraskevi, GreeceThe advent of MEC (Multi-access Edge Computing), as a natural evolution of cloud computing, can enable innovative services and applications, with many opportunities for end users. Hosting applications at the edge could also address privacy and security issues inherent to the traditional cloud-based deployment model, e.g., keeping regional regulatory compliance. However, shifting workloads to the edge of the network warrants the consideration of new security risks. Separately, the recent specification of MEC federations (as result of the GSMA’s Telco Edge Cloud) underscores the importance of security and trust due to the heterogeneity of edge systems in global MEC deployments. Edge cybersecurity solutions must adopt international standards for interoperability. Accordingly, ETSI MEC has endeavored to study edge security threats and craft solutions, oftentimes based on existing standards from other industry groups. This paper discusses the security challenges that arise from shifting workloads to the edge of the network with particular emphasis on international standards and aims to provide a tutorial for developers and architects to navigate the complexities in achieving edge computing security.https://ieeexplore.ieee.org/document/10767241/5Gedge computingedge nativeMECcybersecurity |
spellingShingle | Dario Sabella Kishen Maloor Ned Smith Michaela Vanderveen Akis Kourtis Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications IEEE Access 5G edge computing edge native MEC cybersecurity |
title | Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications |
title_full | Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications |
title_fullStr | Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications |
title_full_unstemmed | Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications |
title_short | Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications |
title_sort | edge computing cybersecurity standards protecting infrastructure and applications |
topic | 5G edge computing edge native MEC cybersecurity |
url | https://ieeexplore.ieee.org/document/10767241/ |
work_keys_str_mv | AT dariosabella edgecomputingcybersecuritystandardsprotectinginfrastructureandapplications AT kishenmaloor edgecomputingcybersecuritystandardsprotectinginfrastructureandapplications AT nedsmith edgecomputingcybersecuritystandardsprotectinginfrastructureandapplications AT michaelavanderveen edgecomputingcybersecuritystandardsprotectinginfrastructureandapplications AT akiskourtis edgecomputingcybersecuritystandardsprotectinginfrastructureandapplications |