Abstract

This study examines, from a security and privacy standpoint, the significant obstacles to maintaining data integrity and confidentiality in edge computing contexts. Data security at the edge becomes critical as more and more edge devices proliferate and generate large volumes of sensitive data. The review of the literature looks at edge computing security problems that currently exist and discusses fixes to protect data integrity and confidentiality. The article explores various vulnerabilities, emphasizing the necessity for strong security systems, including data exposure risks and integrity concerns. It examines secure communication protocols, access control methods, and encryption techniques as crucial risk-reduction instruments. Anonymization and differential privacy are two privacy-preserving techniques that are investigated to find a middle ground between user privacy and data value. The article provides real-world insights through case studies and actual implementations, and it lays out metrics and evaluation criteria for determining how successful security measures are. Finally, the report highlights the need of addressing data security in changing edge computing settings and offers future directions and research difficulties.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call