TY - CHAP
T1 - Security and intelligent management for fog/edge computing resources
AU - Wu, Jun
N1 - Publisher Copyright:
© 2021, Springer Nature Switzerland AG.
PY - 2021
Y1 - 2021
N2 - In 5G and 6G ear, sensing data from huge amount of heterogeneous sensors will generate big data at the edge of IoT. Fog/Edge computing technology is proposed to resolve the edge big data analysis and processing. However, the security and intelligent management for fog/edge computing resources are still open issues. First, because fog/edge computing is usually deployed in large-scale IoT, it faces various threats from untrusted distributed geographic multi-sources and differentiated layer of the networks. Second, content threats will be generated at the communication layer, because software-defined networking/information-centric networking (SDN/ICN) technologies has been introduced into networked fog/edge computing nodes. Third, at the edge of the networks, there is unbalance between the users and providers of fog/edge computing resources, which means on-demand resource scheduling and balance are the must for fog/edge computing. Based on aforementioned motivations, this chapter aims to study the lightweight security and intelligent scheduling approaches for fog/edge computing resources. Collaborative trust, intrusion detection and security isolation, storage resource intelligent orchestration and service popularity-based smart resources partitioning technologies are studied for edge/fog computing. The works are significant to improve the intelligence and security level for novel fog/edge computing systems.
AB - In 5G and 6G ear, sensing data from huge amount of heterogeneous sensors will generate big data at the edge of IoT. Fog/Edge computing technology is proposed to resolve the edge big data analysis and processing. However, the security and intelligent management for fog/edge computing resources are still open issues. First, because fog/edge computing is usually deployed in large-scale IoT, it faces various threats from untrusted distributed geographic multi-sources and differentiated layer of the networks. Second, content threats will be generated at the communication layer, because software-defined networking/information-centric networking (SDN/ICN) technologies has been introduced into networked fog/edge computing nodes. Third, at the edge of the networks, there is unbalance between the users and providers of fog/edge computing resources, which means on-demand resource scheduling and balance are the must for fog/edge computing. Based on aforementioned motivations, this chapter aims to study the lightweight security and intelligent scheduling approaches for fog/edge computing resources. Collaborative trust, intrusion detection and security isolation, storage resource intelligent orchestration and service popularity-based smart resources partitioning technologies are studied for edge/fog computing. The works are significant to improve the intelligence and security level for novel fog/edge computing systems.
UR - http://www.scopus.com/inward/record.url?scp=85100991049&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85100991049&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-57328-7_9
DO - 10.1007/978-3-030-57328-7_9
M3 - Chapter
AN - SCOPUS:85100991049
T3 - Advances in Information Security
SP - 213
EP - 234
BT - Advances in Information Security
PB - Springer
ER -