Enhancing Security and Privacy of Next-Generation Edge Computing Technologies

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The advent of high performance fog and edge computing and high bandwidth connectivity has brought about changes to Internet-of-Things (IoT) service architectures, allowing for greater quantities of high quality information to
be extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations who fail to protect customers’ data. This paper proposes the leveraging of fog and edge computing to facilitate processing of confidential user data, to reduce the quantity and availability of raw confidential data at various levels of the IoT architecture. This ultimately reduces attack surface area, however it also increases efficiency of the architecture by distributing processing amongst nodes and transmitting only processed data. However, such an approach
is vulnerable to device level attacks. To approach this issue, a proposed System Security Manager is used to continuously monitor system resources and ensure confidential data is confined only to parts of the device that require it. In event of an attack, critical data can be isolated and the system informed, to prevent
data confidentiality breach.
Original languageEnglish
Title of host publicationIEEE Conference on Privacy, Security and Trust (PST): Proceedings
Publisher IEEE
Publication statusAccepted - 01 Jun 2019
EventPrivacy, Security and Trust - Fredericton Convention Centre, Fredericton, Canada
Duration: 26 Aug 201928 Aug 2019
Conference number: 17
https://pstnet.ca/

Conference

ConferencePrivacy, Security and Trust
Abbreviated titlePST
CountryCanada
CityFredericton
Period26/08/201928/08/2019
Internet address

Fingerprint

Fog
Security of data
Processing
Security systems
Managers
Availability
Bandwidth
Internet of things

Keywords

  • Edge Computing
  • Cloud to Edge
  • Edge Security
  • IoT
  • Embedded Systems
  • Cyber Resilience
  • Security Micro-architecture
  • Data Protection
  • Active Security
  • GDPR

Cite this

Hagan, M., Siddiqui, F., & Sezer, S. (Accepted/In press). Enhancing Security and Privacy of Next-Generation Edge Computing Technologies. In IEEE Conference on Privacy, Security and Trust (PST): Proceedings IEEE .
Hagan, Matthew ; Siddiqui, Fahad ; Sezer, Sakir. / Enhancing Security and Privacy of Next-Generation Edge Computing Technologies. IEEE Conference on Privacy, Security and Trust (PST): Proceedings. IEEE , 2019.
@inproceedings{d2202b5881c24c458f520957e8b9bad0,
title = "Enhancing Security and Privacy of Next-Generation Edge Computing Technologies",
abstract = "The advent of high performance fog and edge computing and high bandwidth connectivity has brought about changes to Internet-of-Things (IoT) service architectures, allowing for greater quantities of high quality information tobe extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations who fail to protect customers’ data. This paper proposes the leveraging of fog and edge computing to facilitate processing of confidential user data, to reduce the quantity and availability of raw confidential data at various levels of the IoT architecture. This ultimately reduces attack surface area, however it also increases efficiency of the architecture by distributing processing amongst nodes and transmitting only processed data. However, such an approachis vulnerable to device level attacks. To approach this issue, a proposed System Security Manager is used to continuously monitor system resources and ensure confidential data is confined only to parts of the device that require it. In event of an attack, critical data can be isolated and the system informed, to preventdata confidentiality breach.",
keywords = "Edge Computing, Cloud to Edge, Edge Security, IoT, Embedded Systems, Cyber Resilience, Security Micro-architecture, Data Protection, Active Security, GDPR",
author = "Matthew Hagan and Fahad Siddiqui and Sakir Sezer",
year = "2019",
month = "6",
day = "1",
language = "English",
booktitle = "IEEE Conference on Privacy, Security and Trust (PST): Proceedings",
publisher = "IEEE",

}

Hagan, M, Siddiqui, F & Sezer, S 2019, Enhancing Security and Privacy of Next-Generation Edge Computing Technologies. in IEEE Conference on Privacy, Security and Trust (PST): Proceedings. IEEE , Privacy, Security and Trust, Fredericton, Canada, 26/08/2019.

Enhancing Security and Privacy of Next-Generation Edge Computing Technologies. / Hagan, Matthew; Siddiqui, Fahad; Sezer, Sakir.

IEEE Conference on Privacy, Security and Trust (PST): Proceedings. IEEE , 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Enhancing Security and Privacy of Next-Generation Edge Computing Technologies

AU - Hagan, Matthew

AU - Siddiqui, Fahad

AU - Sezer, Sakir

PY - 2019/6/1

Y1 - 2019/6/1

N2 - The advent of high performance fog and edge computing and high bandwidth connectivity has brought about changes to Internet-of-Things (IoT) service architectures, allowing for greater quantities of high quality information tobe extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations who fail to protect customers’ data. This paper proposes the leveraging of fog and edge computing to facilitate processing of confidential user data, to reduce the quantity and availability of raw confidential data at various levels of the IoT architecture. This ultimately reduces attack surface area, however it also increases efficiency of the architecture by distributing processing amongst nodes and transmitting only processed data. However, such an approachis vulnerable to device level attacks. To approach this issue, a proposed System Security Manager is used to continuously monitor system resources and ensure confidential data is confined only to parts of the device that require it. In event of an attack, critical data can be isolated and the system informed, to preventdata confidentiality breach.

AB - The advent of high performance fog and edge computing and high bandwidth connectivity has brought about changes to Internet-of-Things (IoT) service architectures, allowing for greater quantities of high quality information tobe extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations who fail to protect customers’ data. This paper proposes the leveraging of fog and edge computing to facilitate processing of confidential user data, to reduce the quantity and availability of raw confidential data at various levels of the IoT architecture. This ultimately reduces attack surface area, however it also increases efficiency of the architecture by distributing processing amongst nodes and transmitting only processed data. However, such an approachis vulnerable to device level attacks. To approach this issue, a proposed System Security Manager is used to continuously monitor system resources and ensure confidential data is confined only to parts of the device that require it. In event of an attack, critical data can be isolated and the system informed, to preventdata confidentiality breach.

KW - Edge Computing

KW - Cloud to Edge

KW - Edge Security

KW - IoT

KW - Embedded Systems

KW - Cyber Resilience

KW - Security Micro-architecture

KW - Data Protection

KW - Active Security

KW - GDPR

M3 - Conference contribution

BT - IEEE Conference on Privacy, Security and Trust (PST): Proceedings

PB - IEEE

ER -

Hagan M, Siddiqui F, Sezer S. Enhancing Security and Privacy of Next-Generation Edge Computing Technologies. In IEEE Conference on Privacy, Security and Trust (PST): Proceedings. IEEE . 2019