(IJCST-V12I2P6) :berthille Igiraneza
(IJCST-V12I2P6) :berthille Igiraneza
(IJCST-V12I2P6) :berthille Igiraneza
ABSTRACT
This survey paper provides an exhaustive examination of the security landscape within edge computing, identifying and
dissecting the multifaceted security challenges that arise from its decentralized nature and widespread application across
various domains such as Internet of Things (IoT), healthcare, smart cities, and autonomous driving. As edge computing
pushes data processing to the edge of the network, closer to data sources, it introduces unique vulnerabilities and security
concerns distinct from traditional cloud computing paradigms. This paper categorizes these security challenges into data
security, network security, authentication, scalability, manageability, and privacy concerns. Through a systematic review, we
evaluate a spectrum of existing security solutions, ranging from cryptographic methods and secure architectures to advanced
authentication mechanisms and privacy-preserving techniques. Furthermore, the paper delves into emerging technologies like
blockchain, artificial intelligence (AI), and quantum computing, exploring their potential to fortify security in edge
computing environments. By highlighting current gaps, open issues, and potential future threats, this survey underscores the
critical need for continued research, development of adaptive security strategies, and cross-disciplinary collaboration to
navigate the evolving security landscape of edge computing. Through this comprehensive analysis, the paper aims to propel
forward the discourse on edge computing security, paving the way for more secure, efficient, and reliable edge computing
architectures.
Keywords :- Edge Computing Security, Cryptographic Methods, Privacy-preserving Techniques.