The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT.

Neurocomputing(2023)

引用 0|浏览1
暂无评分
摘要
Cloud computing, edge computing, and Internet-of-Things these new Internet concepts have already irreversibly changed and influenced people's lives. The security of the three patterns must not be taken for granted, though. Similar to other emerging technologies, the cloud, edge and IoT are under constant attack. In the case of these paradigms, the potential breaches may paralyse transportation systems, business sectors or even turn out to be life-threatening. So far, there has not yet been a scientific meta analysis of the overlap of the attacks in the cloud, edge and IoT; one that would result in constructing a concise threat catalogue as well as seeking a more universal solution which could contribute to ensuring the security of the whole ecosystem. In order to fill this substantial gap, this systematic review gathers, analyses and extracts data from a substantial number of quality scientific literature papers pertaining to the security issues of the cloud, edge and IoT, and compares the attacks in each concept in order to find the areas of overlap. Another contribution of this paper is that it constructs a catalogue of the identified attacks. In addition to this, it also suggests a number of possible solutions and countermeasures which, when applied, may contribute to safer cloud, edge and IoT alike. & COPY; 2023 Elsevier B.V. All rights reserved.
更多
查看译文
关键词
Cloud,Cloud computing,Cybersecurity,Edge,Edge computing,IoT,Internet-of-Things
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要