Abstract
The advent of high performance fog and edge computing and high bandwidth connectivity has brought about changes to Internet-of-Things (IoT) service architectures, allowing for greater quantities of high quality information to
be extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations who fail to protect customers’ data. This paper proposes the leveraging of fog and edge computing to facilitate processing of confidential user data, to reduce the quantity and availability of raw confidential data at various levels of the IoT architecture. This ultimately reduces attack surface area, however it also increases efficiency of the architecture by distributing processing amongst nodes and transmitting only processed data. However, such an approach
is vulnerable to device level attacks. To approach this issue, a proposed System Security Manager is used to continuously monitor system resources and ensure confidential data is confined only to parts of the device that require it. In event of an attack, critical data can be isolated and the system informed, to prevent
data confidentiality breach.
be extracted from their environments to be processed. However, recently introduced international regulations, along with heightened awareness among consumers, have strengthened requirements to ensure data security, with significant financial and reputational penalties for organisations who fail to protect customers’ data. This paper proposes the leveraging of fog and edge computing to facilitate processing of confidential user data, to reduce the quantity and availability of raw confidential data at various levels of the IoT architecture. This ultimately reduces attack surface area, however it also increases efficiency of the architecture by distributing processing amongst nodes and transmitting only processed data. However, such an approach
is vulnerable to device level attacks. To approach this issue, a proposed System Security Manager is used to continuously monitor system resources and ensure confidential data is confined only to parts of the device that require it. In event of an attack, critical data can be isolated and the system informed, to prevent
data confidentiality breach.
Original language | English |
---|---|
Title of host publication | 2019 17th International Conference on Privacy, Security and Trust, PST 2019 - Proceedings |
Publisher | IEEE |
Number of pages | 5 |
ISBN (Print) | 9781728132655 |
DOIs | |
Publication status | Published - 06 Jan 2020 |
Event | Privacy, Security and Trust - Fredericton Convention Centre, Fredericton, Canada Duration: 26 Aug 2019 → 28 Aug 2019 Conference number: 17 https://pstnet.ca/ |
Publication series
Name | International Conference on Privacy, Security and Trust (PST) |
---|---|
ISSN (Electronic) | 2643-4202 |
Conference
Conference | Privacy, Security and Trust |
---|---|
Abbreviated title | PST |
Country/Territory | Canada |
City | Fredericton |
Period | 26/08/2019 → 28/08/2019 |
Internet address |
Keywords
- Edge Computing
- Cloud to Edge
- Edge Security
- IoT
- Embedded Systems
- Cyber Resilience
- Security Micro-architecture
- Data Protection
- Active Security
- GDPR
ASJC Scopus subject areas
- Electrical and Electronic Engineering
- Architecture
- Hardware and Architecture
- Computer Science(all)
- Information Systems
- Safety, Risk, Reliability and Quality