All Tags
AWS
algorithm-design
architecture
cloud-principles
cost-reduction
data-centric
data-compression
data-processing
deployment
design
edge-computing
energy-footprint
hardware
libraries
locality
machine-learning
management
measured
migration
model-optimization
model-training
performance
queries
rebuilding
scaling
services
strategies
template
workloads
Tactic: One-sided infrastructure control
Tactic sort:
Dark Tactic
Type: Unsustainable Pattern
Category: edge-computing
Tags:
Title
One-sided infrastructure control
Description
If the owner of the edge infrastructure has malicious intentions, it is easy for him to cut access to the technology or control the people using it (e.g., in a dictatorship). This represents a social sustainability threat to anyone using the technology while not in full control of the equipment and applications in the infrastructure. In fact, security and privacy issues are mentioned as more prominent in edge than in cloud.
Participant
edge-provider, end-user, edge-user
Related artifact
Infrastructure
Context
Normal operation
Feature
Infrastructure owner privileges
Tactic intent
Giving great privileges to whoever owns the infrastructure
Intent measure
Extent of (un)lawful interception
Countermeasure
It is necessary to establish trust between the devices, for which there exist an important body of work (see the paper for references). Of course these trust evaluation mechanisms come with an overhead, as discussed in tactic 'trust overhead'.