3 research outputs found

    Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities

    Get PDF
    Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Many researchers have reviewed security and privacy issues in edge computing, but not all have fully investigated the security and privacy requirements. Security and privacy requirements are the objectives that indicate the capabilities as well as functions a system performs in eliminating certain security and privacy vulnerabilities. The paper aims to substantially review the security and privacy requirements of the edge computing and the various technological methods employed by the techniques used in curbing the threats, with the aim of helping future researchers in identifying research opportunities. This paper investigate the current studies and highlights the following: (1) the classification of security and privacy requirements in edge computing, (2) the state of the art techniques deployed in curbing the security and privacy threats, (3) the trends of technological methods employed by the techniques, (4) the metrics used for evaluating the performance of the techniques, (5) the taxonomy of attacks affecting the edge network, and the corresponding technological trend employed in mitigating the attacks, and, (6) research opportunities for future researchers in the area of edge computing security and privacy

    Response surface optimization and modeling of caffeine photocatalytic degradation using visible light responsive perovskite structured LaMnO3

    No full text
    Caffeine is a refractory pollutant of emerging concern that evades conventional waste-water treatment techniques. Here, we report the synthesis of visible light responsive perovskite structured LaMnO­3 photocatalyst using modified Pechini method and utilized it as an efficient photocatalyst for caffeine degradation. XRD, BET, UV-Vis, NH3-TPD, and SEM were used to characterize the photocatalyst. Response surface methodology using Central composite design was used to investigate the effect of three operational variables; catalyst dosage, initial caffeine concentration and pH on the caffeine photocatalytic degradation efficiency. The functional relationship between these operational variables and caffeine photocatalytic degradation efficiency was established be a second order polynomial model. The results of the response surface analysis indicate caffeine degradation efficiency is most significantly affected by catalyst dosage and pH. The optimal values of operational obtained by response surface optimization were found be 3.5 g/L for catalyst dosage, 7.9 and 44.6 mg/L for pH and initial caffeine concentration respectively given the caffeine degradation efficiency of 93.9%

    Lightweight authentication technique for secure communication of edge/fog data-centers

    No full text
    Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are used for storing data of the end-user devices. Secure communication between the legitimate edge data-centres during the load balancing process has attracted industrial and academic researchers. Recently, Puthal et al. have proposed a technique for authenticating edge datacenters to enable secure load balancing. However, the resource-constraint nature of the edge data-centres is ignored. The scheme is characterized by complex computation and memory intensive cryptographic protocol. It is also vulnerable to key escrow attack because the secret key used for encrypting and decrypting of the communicated messages is been created by the trusted cloud datacenter. Additionally, the key sharing phase of their algorithm is complex. Therefore, to address the highlighted challenges, this paper proposed a lightweight key escrow-less authentication algorithm that will ensure secure communication of resource-constrained edge data-centres during the load balancing process. The security capability of the proposed scheme has been formally evaluated using the automatic cryptographic analytical tool ProVerif. The relatively low computation and communication costs of the proposed scheme compared to the benchmark schemes proved that it is lightweight, thus suitable for resource-constrained edge datacenters. © 2020 SERSC
    corecore