All Tags
AWS
algorithm-design
architecture
cloud-principles
cost-reduction
data-centric
data-compression
data-processing
deployment
design
edge-computing
energy-footprint
hardware
libraries
locality
machine-learning
management
measured
migration
model-optimization
model-training
performance
queries
rebuilding
scaling
services
strategies
template
workloads
Tactic: Security overhead
Tactic sort:
Dark Tactic
Type: Unsustainable Pattern
Category: edge-computing
Tags:
Title
Security overhead
Description
Edge computing creates new unforeseen security and privacy issues considered in the dark tactics security overhead, redundancy overhead and trust overhead. Literature on these topics comes up with edge-specific mechanisms to counteract them, as already touched upon in the dark tactics unauthorized surveillance and one-sided infrastructure control. However, these mechanisms almost always require extra com putation to be performed e.g., for encryption and decryption in case of security, or for establishing trust between devices. The overhead is also present in the network as additional metadata become needed in the payloads. At the same time, in order to offer uninterrupted provisioning of edge computing applications, redundant resources must be set up, which increases the environmental impact. Certainly, smarter mechanisms can still be developed to increase security, guarantee continuity of service or establish trust at lower cost. One could also ask if these overheads are significant enough to matter.
Participant
end-user, edge-user
Related artifact
Application running at the edge
Context
Handling of privacy-sensitive data
Feature
Crypt/decrypt data in the edge before sending it to the cloud
Tactic intent
Adding a computational and communication overhead to increase security
Intent measure
Size of overhead
Countermeasure
A first step would be to generalize the evaluation of the extra environmental cost (or at least the extra computation and communication required) of any such mechanisms and compare it with the concurrent approaches.