Module 4 Flashcards
definition/concept of edge computing
- decentralization of networks
- concept of edge computing is that instead of getting the data close to the data center, the data center is brought close to the source
cloud layer
- cloud layer and edge layer complement each other
- edge servers pass on data to the cloud layer for complex processing
- edge servers will also pass a part of the data for storage and comprehensive analysis
edge layer
- layer mainly consists of edge servers larger in quantity and vastly deployed
- edge layer considered to be core
- data which cannot be processed in the edge layer is sent to and analyzed in the cloud layer
device layer
- amongst the three layers it contains the most number of devices
- through sensors, devices in the device layer collect and capture data used to help products achieve the purposes they are designed for
- edge and cloud possess better computing skills but device layer can also do small levels of processing
Security risks and its measures
(edge computing-explain points also)
- Data breach
- Frequent Updates
- Scalability
- Cloud adoption risk
- Edge and IoT security risks
How to secure edge computing ?
(explain points also)
- Keep your devices and your data safe
- Secure your network connection
- Implement security measures at the edge level
- Protect against IoT security risks
- Monitor and log all edge activities
Advantages of edge computing
- Faster response time
- Security and compliance
- Cost-Effective Solution
- Reliable Operation with intermittent connectivity
- Reduced latency
Limitations of edge computing
- Complexity
- Limited Resources
3.. Dependence on connectivity - Security concern
Challenges in edge computing
- Privacy and security of data
- Scalability
- Reliability
- Speed
- Efficiency
Fog computing
-> it is a distributed computing paradigm that extends the cloud services to the edge of the network
-> It facilitates management and programming of compute, networking and storage services between data services and end devices
edge devices
->devices which are at the edge of the network or a bridge between two networks which works by being near the source of the data it manages.
->main function includes transmission, routing, processing, filtering, translation and storage of data between two networks.
eg: sensors, actuators and iot gateways
architecture of fog computing
(remember the functions of each layer)
- Sensors, Edge Devices, Gateways and apps
- Network
- Cloud Services
- Resource management
- Application
(wrt fog computing)
Security risk 1:
Increased attack surface due to distributed nature of the technology
-> Securing the individual devices and systems that make up the fog network, as well as the connections bw them
-> to use encryption and authentication protocols so that only authorized people can access and data transmitted can be saved from eavesdropping and tampering
(wrt fog computing)
Security risk 2:
Privacy, as the technology often involves collection and processing personal data
-> Organizations need to be transparent about their data collection practices and allow users to opt out if needed
(wrt fog computing)
Security risk 3:
Fog computing introduces new challenges in terms of compliance with data protection regulations such as General Protection Regulation(GDPR) in the union
-> should work closely with legal and compliance experts
-> this may include implementing data protection by design principles, conducting regular risk assessments and maintaining detailed record of data processing activities.