Discipline: Computer Sciences and Information Management
Subcategory: Computer Science & Information Systems
Session: 4
Room: Virginia B
Patricia Akello - University of Texas, San Antonio
Co-Author(s): Dr. Nicole Beebe, University of Texas, San Antonio, USA; Dr. Kim-Kwang Raymond Choo, University of Texas, San Antonio, USA
Cloud computing provides powerful and reliable infrastructures for handling the ever- increasing data volumes generated in the data-driven economy. With its high compute, storage and networking capability, it provides a platform for large-scale and complex data processing. In the age of the Internet of Things, (IoT), the cloud alone is not sufficient to handle the varied requirements of IoT applications and sensors. Latency, location awareness and response time all become issues of great concern as cloud servers are located centrally and far away from the data generation devices. This makes it unsuitable for processing data from applications that require real time interaction. Fog and Edge Computing compliment these inherent cloud limitations by extending compute, storage and networking capabilities to the network edge. The three paradigms; cloud, fog and edge computing, though rich in benefits, are faced with many shortcomings; security has been cited as a top concern of cloud computing, and need multifaceted approaches to counter. This paper reports the results of a systematic review of security surveys in the areas of cloud, fog and edge computing. Security is an interconnected ordeal such that a compromise in one area affects another. Our goal was to examine security issues affecting each of the three complimenting paradigms to identify areas of research shortage. Data comprised survey research papers published in the areas of cloud, fog and edge security, from 2012 to August 2019. After reviewing cloud, fog and edge computing literature the relevant topics, we grasped elements of conceptual blending that we can best describe as conflation (that is, understanding one as another or thinking one as another). We found that even though there is plenty of research work reported in cloud security; fog and edge computing are not following a similar trend, as they have received much less attention. We tap into theories of conceptual blending and conceptual confusion to understand the phenomenon. Cloud, fog and edge computing share similar foundational and technological concepts such as virtualization and multitenancy; and given their similarities and co-existence on the IoT framework, researchers have contended they suffer from similar or the same security issues. For example, researchers have referenced the cloud security alliance, CSA’s-Top Threat List, as top concerns in fog and edge as well. We argue that while there are similarities between the three paradigms, conceptual confusion may be an obstacle to research productivity in fog and edge computing. The objective of this paper is threefold: 1-Provide a theory-based discursive perspective on the shortage of research in the edge paradigms (fog and edge computing) in comparison to cloud computing. 2-highlight major security issues that affect cloud, fog and edge computing; and a summary of their solutions. 3- And from the former, identify gaps in literature yet to be filled. References: Thomas Jacobsson & Staffan Jacobsson (2014) Conceptual confusion an analysis of the meaning of concepts in technological innovation systems and sociological functionalism, Technology Analysis & Strategic Management, 26:7, 811-823, DOI: 10.1080/09537325.2014.900171
Funder Acknowledgement(s): This work is partially supported by NSF CREST Grant HRD-1736209 and UT- San Antonio, College of Business
Faculty Advisor: Dr. Nicole Beebe, Dr. Kim-Kwang Raymond Choo, nicole.beebe@utsa.edu
Role: This work was a joint collaboration with Dr Beebe and Dr Choo.