Reinforcement of the Multi-Cloud Infrastructure with Edge Computing

Authors

L. Steffina Morin
SRM Institute of Science and Technology, Tamil Nadu
P. Murali
SRM Institute of Science and Technology, Tamil Nadu

Synopsis

Background: Cloud computing and the Edge computing are two new technologies that have the potential to improve people’s daily lives [1]. Furthermore, the integration of Cloud computing and Edge computing has been enhancing the productivity of a vast range of applications in industries such as supply chains, commercial, engineering, and manufacturing, among others.

Objectives: Security is currently a major concern in Cloud-Edge computing. Modern Edge Cloud security is based on a collection of naive security services such as distribution of keys, authentication, and access control, which are typically deployed at the Cloud as well as Edge level. In recent years, a number of privacy-preserving models and security techniques have been created by a wide range of academics for this goal [2]. Despite this, they have failed to meet the most recent Cloud-Edge user’s security expectations.

Methodology: Cloud-Edge infrastructure comprises of user accounts, servers, storage systems, and networks [3]. Protection of sensitive data in the Cloud-Edge environment which can be collected over the Edge devices can be done by authentication, access control, secure data storage, key provisioning, data loss prevention (DLP), and in terms of user revocation.

Results and Discussion: Security is not limited to the Cloud but also with end user device security. We should be aware of the endpoint devices used by administrators to connect with the database. These edge devices should be secured, and connections from unknown or untrusted devices should be denied. Sessions should be monitored to detect suspicious activity. In this paper, we have proposed the private Cloud-Edge infrastructure using Openstack with features of user authentication, access control, secure communication, data loss prevention (DLP), monitoring the users accounts and data storage and in-transit, least privilege and in terms of user revocation [4].

Conclusions and Future Work: Hence, the process of limiting potential weaknesses makes the Cloud-Edge infrastructure with Openstack vulnerable to cyber-attacks. Complex security needs at the cloud’s edge entail the provision of a large number of basic services [5]. Future work in this area can be done by introducing new light weight cryptographic schemes with the infrastructure to reduce the computational complexity of cloud and edge-based applications.

MISS2021
Published
January 28, 2022