*3.2. Edge-Related Aspects*

Since Cloud computing's performance dropped greatly caused by various factors, including the growing number of nodes, Edge computing has provided a significant paradigm shift. Edge Computing is observed as an innovation because it can carry applications with its new technological capabilities in shared computing while also performing information processing right at the point of need, without transporting the data to the Cloud. Users overall have a better feeling when data are processed close to them, improving their response time. This is made possible thanks to the computation that is directly carried out at the nodes of distributed equipment [62].

Fifth Generation (5G) networks are taking over many areas and operations of our daily activities [63]. Edge computing is undeniably the pivot of all these changes being a part of

5G network, making it vital in terms of smaller resource-constrained devices and how they interact. Edge Computing shows a relationship with heterogeneous equipment and several cross-connected networks. The inter-connectivity of these Edge supporting technologies exposes it to the most concerning aspect of any device, technology, network, and above all, organizations, which is safety. The threats involved here cannot be taken for granted, and this now led us to the subject matter, security, and privacy in Edge Computing. With computation at the node of Edge devices, other security circumstances will show up and still require continuous research work for improvements [64].

In Edge, the chances for imminent threats and attacks are very likely because of the decentralized design of the Edge computing system, even though the processing of information at the nodes offers some security and privacy protection. Smart devices also expose security issues and dangerous malware to Edge computing. The structure of Edge computing cannot adequately support the mechanisms for securing and protecting information. This, therefore, implies that the complexity of this Edge node at the network leaves the data very exposed and hard to secure.

Despite the growing nature of Edge computing technologies, its security and privacy development remain a continuous process and tells why there exist not so many research findings. Researchers and other academics globally have been putting every effort in performing relevant research work to develop countermeasures to improve the security and privacy of Edge systems. Different simple mobile Edge computing methods were used for carrying out security checks, presentation of an overall security and protection scheme with proposals from the research work done. The Edge security findings do present a relevant citation from a theoretical approach. As mentioned previously, the existing known issues in this work relating to Edge computing information security and privacy are partitioned into four separate parts [65]: Access Control, Identity Authentication, Information Security, and Privacy Protection. Based on the focused theme of this work, "Security and Privacy Aspects", we shall be looking more into only Information security and data protection.

### 3.2.1. Edge Data Security

Data integrity, confidentiality, and attack detection are the common goal and reasons for data security. It assists in designing an Edge-computing system that is secured. Issues such as information breach and information loss are resolved by outsourcing information under control, non-fixed storage, and sharing responsibility. Data duties are allowed to be carried out securely by customers. Presently, it is still challenging to identify works on Edge Computing security, and privacy since many academics do mostly focus on Cloud paradigms [66], or perhaps Fog paradigm [67]. The major aim of information security in Edge systems is to securely move data and ease the heavy load by creating a shared model with a smoothly operating system. As a result, very acceptable shared information security and lightweight designs are developed for both end-users and remote nodes.

A key responsibility in safeguarding customers' secrets and upholding the confidence involved, especially at the Edge network, should be rendered, e.g., a digitalized building constructed with many IoT devices, which can be a prime target due to its huge quantity of personal data produced. Therefore, a more regarded approach to protect the privacy of customers and gain their confidence is to make sure that data processing occurs at the Edge network or node of the house [68].

In addition to aspects detected earlier, the following notable Edge-specific elements should be considered. Note, cloud challenges also generally apply to Edge operation scenarios:

• Confidentiality, in the case of mobile clients intending to use the services of mobile applications, is always taken seriously, and for this reason, some clients find it difficult to decide whether to use it [69]. The authors of [70] list some shortcomings relating to Edge computing confidentiality, showing a very high risk posed by the providers of services gaining unpermitted passage to classified information. This occurs during data transmission in a distributed or unsecured network later stored and processed in the Edge distributed network. Data security has constantly been breached. Good enough, restricting access today to project confidentiality is achievable due to some newly created mechanisms [71].

• Detecting Attacks: Edge systems can operate smoothly with the assistance of Edge nodes where the Edge applications are located to offer maximum standard services. This ensures that the entire Edge system is free from abnormalities or threats. The Edge node consists of harsh surroundings with an inadequate security guarantee, exposing the Edge nodes to threats. The performance of an Edge system can massively be hindered when the threats from one Edge node are mismanaged and might subsequently extend to another Edge node. Thus, finding a quick solution can be hard because of the weight of the threat that spreads across the Edge nodes. Furthermore, added costs would be incurred to find the baseline reason for the problem, and even recovery might take a while [72]. Therefore, regular checks must be performed to detect any previous potential or imminent attacks.

### 3.2.2. Edge Data Privacy

In Edge computing, accessing the system does not reflect trust. Averagely accepted systems store important data, resulting in critical privacy leakage. Examples of clients' data stored are personal information, location, and identity. The focus areas to be discussed herein any order include privacy, identity, and location privacy safeguarding [73].

Edge computing always raises much concern in stark contrast to other existing computing models protecting information. This is because the challenges, e.g., leakages relating to Edge data privacy, are daunting. An Edge information center, services, infrastructure suppliers, and even certain clients are the potential weak link or at least establishments you cannot fully trust with such interwoven computing/cellular networks. With regard to this, the act of keeping safe the private information of clients is an obligation that requires very close attention [74]:

