2022
DOI: 10.1155/2022/1473901
|View full text |Cite
|
Sign up to set email alerts
|

The Future Development Direction of Cloud-Associated Edge-Computing Security in the Era of 5G as Edge Intelligence

Abstract: By introducing the Internet-of-Everything, new usage situations such as self-directed movement and vivid competitions constructed upon Virtual Reality or Augmented Reality expertise, besides the Industrial-Internet-of-Thing, accelerates the initial growth of edge-registering improvements. The global versatile correspondence business is now developing toward 5G. Edge processing has gotten a lot of attention around the globe as 5G is one of the major access enhancements to advance the huge scope organization of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 42 publications
0
10
0
Order By: Relevance
“…Account and Service Hijacking: This threat arises from various tactics such as phishing, fraud, exploiting software vulnerabilities, and credential reuse. Attackers can illicitly acqu unauthorized access to services [55][56][57].…”
Section: Artificial Intelligence General Science (Jaigs)168mentioning
confidence: 99%
See 3 more Smart Citations
“…Account and Service Hijacking: This threat arises from various tactics such as phishing, fraud, exploiting software vulnerabilities, and credential reuse. Attackers can illicitly acqu unauthorized access to services [55][56][57].…”
Section: Artificial Intelligence General Science (Jaigs)168mentioning
confidence: 99%
“…The severity of the repercussions depends on the level of access, as individuals with higher privileges can access sensitive data and services. Malicious insiders pose significant risks, including theft of confidential data, reputational damage, financial losses, and productivity disruptions [55][56][57].…”
Section: Artificial Intelligence General Science (Jaigs)168mentioning
confidence: 99%
See 2 more Smart Citations
“…The emergence of the Internet of Things (IoT) has introduced new challenges, including security issues similar to those in cloud computing. Stergiou et al [28] highlighted the security challenges facing IoT and cloud computing, particularly concerning wireless telecommunication systems. Despite the potential benefits of wireless networks for IoT applications, challenges such as power dependence, high costs, and technical complexity remain.…”
Section: Literature Reviewmentioning
confidence: 99%