The Trusted Edge

05/28/2021
by   Christian Meurisch, et al.
0

Edge computing promises to reshape the centralized nature of today's cloud-based applications by bringing computing resources, at least in part, closer to the user. Reasons include the increasing need for real-time (short-delay, reliably-connected) computing and resource-demanding artificial intelligence (AI) algorithms that overstrain mobile devices' batteries or compute power but are too bandwidth-demanding to be offloaded to a distant cloud. However, companies may need to run their protected business logic on (untrusted) third-party edge devices, which can lead to serious issues due to weaker security measures than in cloud environments. This article makes the case for trusted edge computing (TEC), which focuses on developing concepts and methods for protecting application providers' business logic (and thus their intellectual property) specifically tailored to open edge infrastructures. This article further discusses open challenges in TEC to be addressed in the future. Otherwise, edge computing risks being a non-starter for most businesses due to the inadequate and neglected protection of intellectual property.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/02/2019

Edge Intelligence: the Confluence of Edge Computing and Artificial Intelligence

Along with the deepening development in communication technologies and t...
research
10/11/2017

Dependability in Edge Computing

Edge computing is the practice of placing computing resources at the edg...
research
02/12/2021

Towards AIOps in Edge Computing Environments

Edge computing was introduced as a technical enabler for the demanding r...
research
07/01/2021

A Review on Edge Analytics: Issues, Challenges, Opportunities, Promises, Future Directions, and Applications

Edge technology aims to bring Cloud resources (specifically, the compute...
research
04/23/2022

EdgeKeeper: Resilient and Lightweight Coordination for Mobile Edge Computing Systems

Mobile Edge Computing (MEC) has been gaining significant interest from f...
research
12/06/2021

Review of Data Integrity Attacks and Mitigation Methods in Edge computing

In recent years, edge computing has emerged as a promising technology du...
research
12/21/2020

A Fast Edge-Based Synchronizer for Tasks in Real-Time Artificial Intelligence Applications

Real-time artificial intelligence (AI) applications mapped onto edge com...

Please sign up or login with your details

Forgot password? Click here to reset