Edge Computing – “An Enabling Technology for Industrial IoT (IIoT) Devices” – Exploring Its Challenges and Security Issues
Navin Garg1, Amit Gupta2
1Mr. Navin Garg, Graphic Era Hill University, Dehradun (Uttarakhand), India.
2Amit Gupta, Graphic Era Hill University, Dehradun (Uttarakhand), India.
Manuscript received on 27 April 2019 | Revised Manuscript received on 09 May 2019 | Manuscript Published on 18 May 2019 | PP: 6-8 | Volume-8 Issue-6S4 November 2019 | Retrieval Number: F10061186S419/19©BEIESP | DOI: 10.35940/ijeat.F1006.1186S419
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet of Things (IoT) is latest technology these days which generates high volume of data. Efficient use of data analytics techniques on discrete data using Cloud Computing provides significant and precise information. In view of the previously used applications, an application that is IoT enabled such as environmental monitoring, application for navigation and smart healthcare systems being developed with different requirements such as portability, fast and real-time response etc. However, the typical architecture of cloud system cannot fulfill these requirements as the processing of the data being distributed across the world remotely from physical location of installed IoT devices. Hence, the concept of edge computing emerged to perform data storage and processing at the extreme end devices that is nearer to data collection sources than the cloud storage. This makes applications computationally intelligent and location notified. But edge computing suffers from many challenges related to security and privacy when it is been applied to data analytics in association with IoT devices. The literature collected till date still deficient in detail review on the advancements in security and safe data analytics techniques used in edge computing. This paper, first introduce the various concepts and characteristics related to edge computing, and then we try to propose solutions for performing data analytics in a secured and efficient manner, thereafter reviewing the underlying some security attacks in the field of edge computing. Based on our literature survey, we have highlighted current open issues and some future research areas in this field.
Keywords: IoT, Edge Computing, Cloud Computing.
Scope of the Article: IoT