谷歌浏览器插件
订阅小程序
在清言上使用

Review of Data Integrity Attacks and Mitigation Methods in Edge computing

arxiv(2021)

引用 1|浏览3
暂无评分
摘要
In recent years, edge computing has emerged as a promising technology due to its unique feature of real-time computing and parallel processing. They provide computing and storage capacity closer to the data source and bypass the distant links to the cloud. The edge data analytics process the ubiquitous data on the edge layer to offer real-time interactions for the application. However, this process can be prone to security threats like gaining malicious access or manipulating sensitive data. This can lead to the intruder's control, alter, or add erroneous data affecting the integrity and data analysis efficiency. Due to the lack of transparency of stakeholders processing edge data, it is challenging to identify the vulnerabilities. Many reviews are available on data security issues on the edge layer; however, they do not address integrity issues exclusively. Therefore, this paper concentrates only on data integrity threats that directly influence edge data analysis. Further shortcomings in existing work are identified with few research directions.
更多
查看译文
关键词
Data Integrity, Data Security, Edge computing, Edge Data Analytics
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要