Awesome and Dark Tactics
Homepage Catalog Tag Selection Contributions
All Tags AWS algorithm-design architecture cloud-principles cost-reduction data-centric data-compression data-processing deployment design edge-computing energy-footprint hardware libraries locality machine-learning management measured migration model-optimization model-training performance queries rebuilding scaling services strategies template workloads

<- Back to category

Tactic: Security overhead

Tactic sort: Dark Tactic
Type: Unsustainable Pattern
Category: edge-computing
Tags:

Title

Security overhead

Description

Edge computing creates new unforeseen security and privacy issues considered in the dark tactics security overhead, redundancy overhead and trust overhead. Literature on these topics comes up with edge-specific mechanisms to counteract them, as already touched upon in the dark tactics unauthorized surveillance and one-sided infrastructure control. However, these mechanisms almost always require extra com putation to be performed e.g., for encryption and decryption in case of security, or for establishing trust between devices. The overhead is also present in the network as additional metadata become needed in the payloads. At the same time, in order to offer uninterrupted provisioning of edge computing applications, redundant resources must be set up, which increases the environmental impact. Certainly, smarter mechanisms can still be developed to increase security, guarantee continuity of service or establish trust at lower cost. One could also ask if these overheads are significant enough to matter.

Participant

end-user, edge-user

Related artifact

Application running at the edge

Context

Handling of privacy-sensitive data

Feature

Crypt/decrypt data in the edge before sending it to the cloud

Tactic intent

Adding a computational and communication overhead to increase security

Intent measure

Size of overhead

Countermeasure

A first step would be to generalize the evaluation of the extra environmental cost (or at least the extra computation and communication required) of any such mechanisms and compare it with the concurrent approaches.

Source

*The Dark Side of Cloud and Edge Computing* by Klervie Toczé, Maël Madon, Muriel Garcia and Patricia Lago (DOI: https://doi.org/10.21428/bf6fb269.9422c084)


Graphical representation

  • Contact person
  • Patricia Lago (VU Amsterdam)
  •  disc at vu.nl
  •  patricialago.nl

The Archive of Awesome and Dark Tactics (AADT) is an initiative of the Digital Sustainability Center (DiSC). It received funding from the VU Amsterdam Sustainability Institute, and is maintained by the S2 Group of the Vrije Universiteit Amsterdam.

Initial development of the Archive of Awesome and Dark Tactics by Robin van der Wiel