A Data Quarantine Model to Secure Data in Edge Computing

11/15/2021
by   Poornima Mahadevappa, et al.
0

Edge computing provides an agile data processing platform for latency-sensitive and communication-intensive applications through a decentralized cloud and geographically distributed edge nodes. Gaining centralized control over the edge nodes can be challenging due to security issues and threats. Among several security issues, data integrity attacks can lead to inconsistent data and intrude edge data analytics. Further intensification of the attack makes it challenging to mitigate and identify the root cause. Therefore, this paper proposes a new concept of data quarantine model to mitigate data integrity attacks by quarantining intruders. The efficient security solutions in cloud, ad-hoc networks, and computer systems using quarantine have motivated adopting it in edge computing. The data acquisition edge nodes identify the intruders and quarantine all the suspected devices through dimensionality reduction. During quarantine, the proposed concept builds the reputation scores to determine the falsely identified legitimate devices and sanitize their affected data to regain data integrity. As a preliminary investigation, this work identifies an appropriate machine learning method, Linear Discriminant Analysis (LDA), for dimensionality reduction. The LDA results in 72.83 training time, which is efficient than other state-of-the-art methods. In future, this would be implemented and validated with ground truth data.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/06/2021

Review of Data Integrity Attacks and Mitigation Methods in Edge computing

In recent years, edge computing has emerged as a promising technology du...
research
12/21/2020

Edge Computing in Transportation: Security Issues and Challenges

As the amount of data that needs to be processed in real-time due to rec...
research
07/02/2020

Five-Layers SDP-Based Hierarchical Security Paradigm for Multi-access Edge Computing

The rise in embedded and IoT device usage comes with an increase in LTE ...
research
06/19/2023

Confidential Computing in Edge-Cloud Hierarchy

The paper introduces confidential computing approaches focused on protec...
research
10/11/2017

Dependability in Edge Computing

Edge computing is the practice of placing computing resources at the edg...
research
10/20/2022

A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends

Recent advances in edge computing have pushed cloud-based data caching s...
research
10/03/2019

APEX: Adaptive Ext4 File System for Enhanced Data Recoverability in Edge Devices

Recently Edge Computing paradigm has gained significant popularity both ...

Please sign up or login with your details

Forgot password? Click here to reset