Papers
Topics
Authors
Recent
Search
2000 character limit reached

Review of Data Integrity Attacks and Mitigation Methods in Edge computing

Published 6 Dec 2021 in cs.CR | (2112.02757v1)

Abstract: In recent years, edge computing has emerged as a promising technology due to its unique feature of real-time computing and parallel processing. They provide computing and storage capacity closer to the data source and bypass the distant links to the cloud. The edge data analytics process the ubiquitous data on the edge layer to offer real-time interactions for the application. However, this process can be prone to security threats like gaining malicious access or manipulating sensitive data. This can lead to the intruder's control, alter, or add erroneous data affecting the integrity and data analysis efficiency. Due to the lack of transparency of stakeholders processing edge data, it is challenging to identify the vulnerabilities. Many reviews are available on data security issues on the edge layer; however, they do not address integrity issues exclusively. Therefore, this paper concentrates only on data integrity threats that directly influence edge data analysis. Further shortcomings in existing work are identified with few research directions.

Citations (3)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.