2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC) 2022
DOI: 10.1109/icaaic53929.2022.9792868
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Edge-Computing: Challenges in Security and Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 24 publications
0
0
0
Order By: Relevance
“…Edge computing security challenges the existing trust that end-users have when using device-level services [13]. Better securing IoT devices increases the trust relationship between the user the manufacturer, and the service provider.…”
Section: Lack Of Security Impacts Trust In Relationshipsmentioning
confidence: 99%
See 1 more Smart Citation
“…Edge computing security challenges the existing trust that end-users have when using device-level services [13]. Better securing IoT devices increases the trust relationship between the user the manufacturer, and the service provider.…”
Section: Lack Of Security Impacts Trust In Relationshipsmentioning
confidence: 99%
“…When users of these devices find out about the lack of security onboard, particularly while the whole aim was to secure physical premises that contained expensive tools and assets, there is an instant loss of trust in technology and the designers and developers of the technology [15]. Sharan et al [13] identify that the main weakness in such established relationships is a failure to understand that both security and privacy impact trust between the user and the service provider.…”
Section: Lack Of Security Impacts Trust In Relationshipsmentioning
confidence: 99%