ArticlePDF Available

Edge Computing vs. Cloud Computing: An overview of Big Data challenges and opportunities for large enterprises

Authors:

Abstract

There are a variety of security concerns around cloud computing infrastructure technology. Some of these include infrastructure security against threats, data privacy, integrity, and infrastructure stability. In modern cloud computing, there are two models that cloud computing infrastructures follow: centralized cloud computing and decentralized cloud computing. Centralized cloud computing is susceptible to outages, data breaches, and other security threats. Decentralized cloud computing is more resilient to outages due to geo-redundancy technology, and data is better protected by encryption through Reid Solomon erasure coding.
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
m@International Research Journal of Modernization in Engineering, Technology
and Science
[1]
Edge Computing vs. Cloud Computing: An overview of Big Data challenges
and opportunities for large enterprises
Mr. Gopala Krishna Sriram*1
*1 Software Architect, EdgeSoft Corp, McKinney, TX USA
ABSTRACT
There are a variety of security concerns around cloud computing infrastructure technology. Some of these
include infrastructure security against threats, data privacy, integrity, and infrastructure stability. In modern
cloud computing, there are two models that cloud computing infrastructures follow: centralized cloud
computing and decentralized cloud computing. Centralized cloud computing is susceptible to outages, data
breaches, and other security threats. Decentralized cloud computing is more resilient to outages due to geo-
redundancy technology, and data is better protected by encryption through Reid Solomon erasure coding.
Keywords: Security practices; Cybersecurity; Data integrity; Cloud computing; Decentralized cloud computing;
Blockchain; Geo-redundancy; Reed Solomon erasure coding, Etc.
I. Introduction
IoT and Big Data have led to mass disorganized information, which is only bound to become worse in the
coming years as the IoT-connected devices rise to 43 billion by the year 2023 [1]. Large amounts of data
created as a result, known as Big Data, brings new sets of challenges for large enterprises [2]. This large data
needs to be processed in a way to derive meaningful insights for decision making using sophisticated software
applications that are capable of processing Big Data. Cloud Computing and Edge Computing are powerful
software technologies to help large enterprises process Big Data. According to Forbes, 13% of big enterprises
with over 1K employees have immigrated to the cloud [3]. More large enterprises are expected to take similar
actions as Big Data management eventually moves to the cloud. However, this transition is not hassle-free.
Statista reports that around 60% of the enterprises find cloud data management to be extremely challenging
[4]. This paper focuses on understanding the benefits and challenges of Cloud and Edge computing, and how
large enterprises can adopt these two computing models in conjunction to create dynamic applications.
Organization: Section two of the paper discusses the relationship between Cloud Computing and Edge Computing,
and their impact on large enterprises in terms of data analytics and processing. Section three outlines the
opportunities and Challenges in both computing technologies for large enterprises or medium-sized businesses
that are scaling. Section four and five discusses their use case and implementation in large enterprises.
II. Edge Computing vs. Cloud Computing for large enterprises
Large enterprises are big companies usually with over 250 employees, focused on solving critical problems within
an industry. These enterprises are retail factories, big IT companies, manufacturing plants, and the healthcare
sector, to mention a few. Large enterprises utilize Big Data to make intelligent and insightful decisions that impact
profitability and success in the long run. Without proper data analytics and processing, it is impossible to draw
meaningful insights from structured and unstructured data that constantly flows into the enterprises' data centers.
As the data grows, the traditional software applications with limited processing powers are not enough to process
information and hence can render an enterprise incapable of making smart decisions.
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[2]
To resolve the Big Data management challenges, large enterprises need to rely on technologies like Cloud
Computing and Edge Computing.
Cloud Computing: Cloud Computing is a centralized computing architecture that enables enterprises to utilize in-
demand computer system capabilities, including computing power and large data storage on the cloud without
direct interference by the user. In Cloud Computing, data can be located at more than one local location including
third-party servers [5]. Some examples of Cloud Computing include services like Dropbox, Microsoft Azure, and
Rackspace. Cloud solutions are used in large enterprises for increased elasticity, agility, ease of processing, and
accessibility [6].
Edge Computing: Edge Computing is a distributed computing architecture that enables enterprises to
utilize data collection, analysis, and processing on the edge of the network with direct interference from the
user. Edge technology processes data as close to its physical source as possible [7]. Some examples of Edge
Computing include autonomous vehicles, fleet management devices, remote gas, and oil monitoring, predictive
maintenance devices, and smart agriculture and surveillance. Edge Computing devices make intelligent self-
decisions and real-time responses based on information acquired through IoT devices.
The following figure demonstrates the difference between Edge Computing and Cloud Computing.
Figure 1. Cloud Computing vs. Edge Computing
Both Cloud Computing and Edge Computing help large enterprises make use of intelligent tools, including machine
learning capabilities and statistical tools. The method of storing and analyzing data is the same with both
technologies; however, the difference lies in the physical location, the speed by which the data is analyzed, and the
amount of data analyzed at a time. And because of these differences, where one lacks, the other offers a unique
opportunity. Section 3 discusses how large enterprises can use the opportunities in both Cloud Computing and
Edge Computing while understanding the challenges in both technologies.
III. Edge Computing vs. Cloud Computing: Challenges and opportunities for large
enterprises
Data analysis and analytics
Cloud Computing offers a centralized data management architecture with organized computers which
receive the data from varying sources for analytics and other purposes [8]. It offers scalable resources over
several networks for data processing, creating enhanced flexibility for Big Data management [9]. Cloud
Computing essentially offers access-based computing infrastructure designed to build and maintain myriad
types of application services [10]. Cloud Computing utilizes internet computer resources to store and process
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[3]
data rather than using local computers. The work is distributed on several computers in several locations
where they run a simultaneous project via a computer group. This distributed work enables a much more
efficient analytics system that runs rapidly to perform the time-consuming data analysis [11].
In contrast, Edge Computing is a decentralized model that processes data locally at its place of origin. It sits
between the end-user and the cloud to deliver instantaneous results without any delays [12]. By quickly accessing
user analytics, large enterprises can learn more about their customer's interaction with the services and amend
customer services based on user experience. Some researchers see Edge Computing as an optimized form of Cloud
Computing that performs data analytics as close to its source as possible [13]. Some researchers also find Edge
Computing similar to Fog Computing [14]. Fog Computing is similar to Edge Computing with minor differences.
Fog Computing is more infrastructure-oriented compared to Edge Computing, but in terms of data analytics, both
technologies are the same.
In terms of data analytics, large enterprises have the opportunity to use Cloud Computing for substantial data
processing related to complicated web applications. Whereas Edge Computing can aid the web application by
quickly processing user requests as they occur.
The amount of data processed and real-time bug insights
Large enterprises can recognize problems with Edge Computing for instantaneous resolve. By delivering results
right at the origin of data, Edge Computing helps decision-makers take quick corrective actions that would
otherwise be delayed in a centralized data processing system. Quick actions lead to prompt results for improved
organizational performance and ultimately better revenues. Without real-time bug identification, enterprise
applications can face service delays and even lose customers. In contrast, Cloud Computing does not offer
instantaneous results or real-time insights. However, Cloud Computing can process large amounts of data that can
offer intricate details and meaningful insights that are simply not possible with Edge Computing as it only
processes limited data and has limited memory [15]. Therefore, large enterprises need to utilize both Edge and
Cloud technologies to draw comprehensive insights regarding web applications and their use.
Speed and response time
The greatest advantage of Edge Computing is reduced latency and improved network performance. In today's
highly competitive environment, speed is no longer a competitive advantage but rather a necessity. In the financial
sector, a slow network could reduce the performance of trading algorithms resulting in substantial losses.
Similarly, in data-driven industries, lack of speed could result in frustrated customers who may never return. Edge
Computing helps large enterprises take care of speed problems. Since the Edge devices collect and process data
locally, the information doesn't have to travel far enough as it would in a conventional cloud architecture.
However, the amount of data processed and the speed with which it is processed are directly linked with
computing power. Edge technology does not have a high computing power and offers only limited capacities for
data processing [16]. In contrast, Cloud Computing has higher computing power to offer more efficient computing
[17]. In the future, as the data traffic increases, there are bound to be data traffic jams and Edge Computing could
be the mediating force.
Network security
Both technologies face unique cyber threats that may make cloud adoption extremely challenging for large
enterprises. However, there are various ways to secure data on both Edge and Cloud through proper
implementation of security measures.
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[4]
On one hand, Edge devices do increase certain security risks, but on the other, they mitigate other paramount
security threats that could cause significant data loss. The conventional cloud architecture is based on a centralized
network that is vulnerable to distributed denial of service or DDoS attacks and major power outages that can
hinder progress. Edge Computing distributes data to varying locations, which ensures that a single network's
disruption does not impair any other networks. Additionally, since data is processed locally, only a portion of data
is actually at risk.
Edge Computing devices could be used as an entry point for cyberattacks, malware, and other forms of intrusions
that can infect the network. But since the architecture of Edge Computing is inherently distributed, it is easy to
apply security protocols that can efficiently seal weak points without hindering the progress of the entire network.
Edge data centers can face security risks like malicious software/hardware injections, physical tampering, and
routing information attacks. Quality Edge data centers offer several tools to protect networks in real-time by
offering data center metrics, including power usage, SLA uptime, Network traffic, and latency, which can reduce
network security threats.
Network and data security threats in Cloud Computing include (as identified in past researches) account or service
hijacking, data scavenging, data leakage, denial of service, customer data manipulation, VM escape, VM hopping,
malicious VM creation, insecure VM migration, and spoofing virtual networks [18].
Currently, one of the biggest security problems with Cloud Computing is data stored in different locations and with
different providers [19]. Most service providers have to rely on third-party infrastructure provided for data
security. Even if an enterprise is using a virtual private cloud, the security settings can be only handled remotely,
and therefore there is no way to know if the security features have been fully implemented. This can lead to
unauthorized access to data centers, which can lead to several security risks [20].
Most Cloud Computing security risks can be mitigated through multi-factor authentication, permissions sharing,
encryption, and software updates.
Scalability, versatility, and reliability
As enterprises grow, the need for a reliable cloud infrastructure grows. Edge Computing allows enterprises to use
storage and data analytics capability into smaller devices located closer to the end-user. But at the same time, the
limited resources and computing power do not allow Edge Computing to help large enterprises scale. Cloud
Computing, on the other hand, allows increased scalability.
In terms of versatility, Edge Computing helps enterprises expand into local markets by creating partnerships with
local data centers. These partnerships eliminate the need for investing in new, expensive infrastructures for
expansion. Cloud Computing, on the other hand, allows data processing for large-scale applications that is not
possible with Edge.
For microdata management and processing, Edge technology offers ample scalability options and network
reliability. Cloud computing offers scalability and reliability for macro data management.
Data processing capacity
Compared to Cloud Computing,
Edge Computing is still in its infancy. While Cloud Computing has a plethora of applications dedicated to helping
enterprises manage data (For example, Microsoft Azure and Amazon web services), Edge Computing has yet to
introduce comprehensive applications capable of storing substantial amounts of data. Since the data processing
needs are only going to rise in the future, Edge Computing technologies need to support several types of storage
options with the capacity to store data for longer.
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[5]
Additionally, the computing power of Edge devices is repressed due to bulk computation conducted in the same
location. As noted earlier, to avoid computational repression, Edge devices are designed to perform analysis for
smaller datasets. However, while Edge Computing may have limited capacities to process large amounts of data, it
still offers instantaneous, real-time results and insights as a response to user requests [21]. Cloud Computing, on
the other hand, is unable to offer real-time analysis as the data processing is conducted far from the source of data
[22].
Cost
Cloud computing is an expensive data management solution. While the solutions offered are worth the price for
large enterprises, the price still might be a hindering factor in cloud adoption. The expense can further increase
with data storage and processing needs, which may further discourage companies from taking their data to the
cloud [23]. Compared to Cloud Computing, Edge technology is much more affordable with less expensive IoT
devices and no additional costs [24]. However, while it offers an affordable computing model, it lacks the diverse
functionalities of Cloud Computing.
Standardized IoT protocols
Lack of standardization is a noted challenge in both Cloud and Edge technologies. The lack of common IoT
standards or protocols may cause data security issues during transfer or migration to Cloud [25].
Data control
Since Edge Computing processes parts of data rather than a comprehensive dataset, large enterprises may lose
valuable insights that may result in loss of business. Whereas on the Cloud, big datasets can be processed deriving
absolute key insights.
IV. Comparison of cloud computing and edge computing benefits and challenges
The following figure shows the comparison between the two technologies.
Figure 2. Edge Computing vs. Cloud Computing comparison
V. How can large enterprises use Edge and Cloud Computing in conjunction?
To get past the data processing limitations, security risks, operational costs, and bandwidth issues among others,
large enterprises need to encompass flexible, open architecture cloud systems for data processing. Large
enterprises need data computing systems that offer easy connectivity via several communication modes, including
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[6]
Wi-Fi and GPS, and have the capability to run unique, multiple software stacks in a homogeneous way, including
data analysis, machine learning, and a firewall. Edge and Cloud technologies will enable large enterprises to create
that open cloud architecture capable of multifunctional capacities that aid in dynamic applications' development.
The aforementioned challenges in Cloud and Edge Computing can be tackled through virtualization, ruggedization,
enhanced container security, multi-carrier support, membership-access only, and private connectivity. Therefore,
while there are challenges to overcome, there are solutions that the large enterprises can incorporate to make the
transition to the Cloud easy.
VI. Edge Computing and Cloud Computing use case
Surveillance cameras for security and manufacturing purposes send large amounts of data to the cloud. With Edge
Computing companies can decide what data to store and send to the Cloud for storage rather than storing all
recorded data. Less data needs less bandwidth and processing times hence helping companies save computing
resources, time, and reduce the amount of traffic sent through the network.
VII. Conclusion
Both Cloud Computing and Edge Computing offer myriad benefits to large enterprises that are bound to experience
an influx of data in the coming years. Both computing technologies can readily enable large enterprises to process,
organize, and store big data with their own sets of limitations. One size doesn't fit all and similarly, one technology
may not serve every enterprise's needs especially as we head towards a future where data will become the
lifeblood of business. In the future, when more and more businesses realize the value of big data and the power of
analytics, there will be an increased demand for data processing solutions. Large enterprises can stay a step ahead
of the competition by utilizing high-tech technological capabilities offered by both Cloud and Edge computing.
Based on the above research, it can be concluded that large enterprises need to utilize both Edge computing and
Cloud computing as a bundle rather than independent technologies. Where one lacks, the other delivers. Edge
Computing can reduce data processing time while Cloud Computing can fulfill the need for storing large amounts
of data. Enterprises need to strike a balance between using Cloud and Edge technologies for a harmonious
infrastructure that readily tackles the challenges of Big Data in the coming years.
VIII. References
[1] 1.Sestino, A., Prete, M. I., Piper, L., & Guido, G. (2020). Internet of things and Big Data as enablers for
Business Digitalization Strategies. Technovation, 98, 102173.
https://doi.org/10.1016/j.technovation.2020.102173
[2]. Khan, N.; Yaqoob, I.; Hashem, I. A. T.; Inayat, Z.; Ali, W. K. M.; Alam, M.; Shiraz, M. & Gani, Abdullah.(2014)..
doi:10.1143/JJAP.29.L1497
[3]. Columbus, L. (2020, August 3). 32% of IT budgets will be dedicated to the cloud by 2021. Forbes. Retrieved
January 25, 2022, from https://www.forbes.com/sites/louiscolumbus/2020/08/02/32-of-it-budgets-will-be-
dedicated-to-the-cloud-by-2021/?sh=237fae9d5fe3
[4]. Mlitz, K. (2021, December 8). Cloud Data Management Challenges 2022. Statista. Retrieved January 25, 2022,
from https://www.statista.com/statistics/1186357/worldwide-data-management-challenges-cloud/
[5]. Verma, D. K. & Sharma, T. (2019). Issues and Challenges in Cloud Computing. Int. J. Adv. Res. Comput. Commun.
Eng., Vol. 8, pp. 188–195.
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[7]
[6]. Pan, J. & McElhannon, J. FutureEdge Cloud and Edge Computing for Internet of Things Applications. IEEE
Internet Things J., Vol. 5, pp.439–449.
[7]. Saif, S. & Wazir, S. (2018). Performance Analysis of Big Data and Cloud Computing Techniques: A Survey. in
Procedia Computer Science, Vol. 132, pp. 118–127.
[8]. Naeem, M. M.; Mahar, H.; Memon, F. & Siddique, M. (2016). Cluster Computing Vs Cloud Computing. Sci. Int.,
Vol. 28, pp. 5267–5271.
[9]. Mell, P. & Grance, T. (2011). The NIST Definition of Cloud Computing. National Institute of Standards and
Technology, Information Technology Laboratory Note, Vol. 15, pp. 1–7.
Bhandari, G. P. & Gupta, R. (2018). An Overview of Edge/Cloud Computing Architecture with its Issues and
Challenges. doi:10.4018/978-1-5225-7149-0.ch001
[10]. Bhandari, G. P. & Gupta, R. (2018). An Overview of Edge/Cloud Computing Architecture with its Issues and
Challenges. doi:10.4018/978-1-5225-7149-0.ch001
[11]. Naeem, M. M.; Mahar, H.; Memon, F. & Siddique, M. (2016). Cluster Computing Vs Cloud Computing. Sci. Int.,
Vol. 28, pp. 5267–5271.
[12]. Khan, S.; Parkinson, S. & Qin, Y. (2017). Fog computing security: a review of current applications and security
solutions. J. Cloud Comput., Vol. 6,pp. 1-22.
Shi, W.; Cao, J.; Zhang, Q.; Li, Y. & Xu, L. (2016). Edge Computing: Vision and Challenges. IEEE Internet Things J., Vol.
3, pp. 637–646.
Bilal, K.; Khalid, O.; Erbad, A. & Khan, S. U. (2018). Potentials, trends, and prospects in edge technologies: Fog,
cloudlet, mobile edge, and micro data centers. Comput. Networks, Vol. 130, pp. 94–120.
[13]. Bhandari, G. P. & Gupta, R. (2018). An Overview of Edge/Cloud Computing Architecture with its Issues and
Challenges. doi:10.4018/978-1-5225-7149-0.ch001
[14]. Hussain, F. & Al-Karkhi, A. (2017). Big Data and Fog Computing. in the Internet of Things. doi:10.1007/978-
981-13-3384-2_11
[15]. Hu, P.; Dhelim, S.; Ning, H. & Qiu, T. (2017). Survey on fog computing: architecture, key technologies,
applications, and open issues. J. Netw. Comput. Appl., Vol. 98, pp. 27–42.
[16]. Hu, P.; Dhelim, S.; Ning, H. & Qiu, T. (2017). Survey on fog computing: architecture, key technologies,
applications, and open issues. J. Netw. Comput. Appl., Vol. 98, pp. 27–42.
[17]. Shi, W.; Cao, J.; Zhang, Q.; Li, Y. & Xu, L. (2016). Edge Computing: Vision and Challenges. IEEE Internet Things
J., Vol. 3, pp. 637–646.
Bautista Villalpando, L. E.; April, A. & Abran, A. (2014). Performance analysis model for big data applications in
cloud computing. J. Cloud Comput., Vol. 3, pp. 1–20.
[18]. Nabeel Khan & Adil Al-Yasiri, 2016. "Cloud Security Threats and Techniques to Strengthen Cloud Computing
Adoption Framework," International Journal of Information Technology and Web Engineering (IJITWE), IGI Global,
vol. 11(3), pages 50-64, July.
[19]. Kadhim, Q. K.; Yusof, R. & Mahdi, H. S. (2018). A Review Study on Cloud Computing Issues Related content. in
1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017, pp. 1–11. doi:10.1088/1742-
6596/1018/1/012006
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[8]
[20]. Al-Dhuraibi, Y.; Paraiso, F.; Djarallah, N. & Merle, P. (2018). Cloud computing: state-of-the-art and research
challenges. IEEE Trans. Serv. Comput., Vol. 1, pp. 7–18.
[21]. Ai, Y.; Peng, M. & Zhang, K. (2018). Edge computing technologies for Internet of Things: a primer. Digit.
Commun. Networks, Vol. 4, pp.77–86.
[22]. Puliafito, C.; Mingozzi, E.; Longo, F.; Puliafito, A. & Rana, O. (2019). Fog Computing for the Internet of Things.
ACM Trans. Internet Technol., Vol. 19, pp. 1–41.
[23]. Kumar, V.; Laghari, A. A.; Karim, S.; Shakir, M. & Anwar Brohi, A. (2019). Comparison of Fog Computing &
Cloud Computing. Int. J. Math. Sci. Comput., Vol. 5, pp. 31–41 (2019).
Saif, S. & Wazir, S. (2018). Performance Analysis of Big Data and Cloud Computing Techniques: A Survey. in
Procedia Computer Science, Vol. 132, pp. 118–127.
Beri, R. & Behal, V. (2015). Cloud Computing: A Survey on Cloud Computing. Int. J. Comput. Appl., Vol. 111, pp.
19–22.
[24]. Shi, W.; Cao, J.; Zhang, Q.; Li, Y. & Xu, L. (2016). Edge Computing: Vision and Challenges. IEEE Internet Things
J., Vol. 3, pp. 637–646.
... It is also utilised in recommender systems, natural language processing, and a variety of other applications. The primary advantage of CNN over its predecessors is that it detects vital characteristics without the need for social interaction [33,34]. In deep learning, CNN is the most desirable and typical model [35]. ...
... In this layer, class scores are produced. To improve the performance, ReLu may be used between these layers [34]. The optimization functions commonly used in Neural networks like sigmoid, tanh, and ReLu are explained in Equations (1)-(3). ...
Article
Full-text available
Object detection has received a lot of academic attention in recent years because of its tight association with video analysis and picture interpretation. With the fast growth of deep learning, more powerful tools capable of learning semantic, high‐level, and deeper features are being offered to address difficulties in traditional architectures. These models react differently in terms of network design, training approach, and optimization function, among other things. This study describes multiple deep learning models and their characteristics for object detection in pictures and videos. Convolutional Neural Networks (CNN), models based on Region proposal, and models based on regression/classification are the many deep learning approaches. The study also discusses how deep learning approaches differ from one another and their weaknesses in comparison to the prior model. Face identification, pedestrian detection, autonomous driving, and other applications of object detection are also explored in this work. From the study, it was found that object recognition is a group of tasks for recognizing items in digital pictures. R‐CNNs, or Region‐based Convolutional Neural Networks, are a class of algorithms for tackling object localization and recognition problems that are optimized for model performance. You Only Look Once, or YOLO is a second family of object identification systems geared for speed and real‐time application.
... Cloud computing was a game-changer technology since its emergence nearly a decade ago, the key feature behind this revolutionary paradigm is its ability to provide resources like hardware or software as services over internet to individuals and companies. It offers a certain number of advantages like elasticity, pay as you go, multi-tenancy and so on [1]. It is worth pointing that it must guarantee sustainably users trust by maintaining availability, reliability and scalability. ...
Preprint
Full-text available
Today cloud computing is at the heart of all information technologies. This prodigious technological paradigm relies on a very simple concept defined as the ability to deliver hardware and software resources as service directly over internet. A set of mechanisms cooperate to maintain the cloud reliability and to allow continuous delivery of these services while guaranteeing the same quality of service (QoS) and respecting the service-level agreement (SLA) for each client. Load balancing is one of those mechanisms and it ensures a crucial service, it can be defined as the ability of the system to ensure fairness in the distribution of workload over all servers. The most recent load balancing techniques are hybrid methods involving in major cases the combination between static and dynamic approaches, in other cases it can go further by integrating other mechanisms in order to improve the overall efficiency of the systems. The performance can be evaluated by parameters which generally refers to the degree of compliance with SLA and QoS. In order to enhance load balancing and tasks scheduling in cloud environment we propose in this paper a different hybrid approach which allows the decomposition of the problem and to operate on two levels by going through two stages : (i) first clusters are built for each datacenter grouping together subsets of servers that have close utilization rates, (ii) then tasks scheduling and load balancing operate at the datacenter level to deal with distribution over clusters and at the cluster level to ensure fairness between servers of the same cluster. Our method allows hot-deployment in already operating cloud environments and an excellent scalability. It also offers decoupling of missions and strong interoperability between the different mechanisms. To prove its validity, we implemented it on the standard cloudSim plus simulator, before carrying out a comparative study which shows better results than existing approaches in terms of makespan, reduces reaction time, number of migrations required and SLA violations.
... The main difference between edge computing and cloud computing is that edge computing brings computing resources closer to the data source, while cloud computing centralizes computing resources in remote data centers. The main difference between fog computing and both edge and cloud computing is that fog computing is a hybrid architecture that combines the benefits of edge and cloud computing [6]. ...
Article
Full-text available
More and more activities are being undertaken to implement the Industry 4.0 concept in industrial practice. One of the biggest challenges is the digitization of existing industrial systems and heavy industry operations, where there is huge potential for optimizing and managing these processes more efficiently, but this requires collecting large amounts of data, understanding, and evaluating it so that we can add value back based on it. This paper focuses on the collection, local pre-processing of data, and its subsequent transfer to the cloud from an industrial hydraulic press to create a comprehensive dataset that forms the basis for further digitization of the operation. The novelty lies mainly in the process of data collection and pre-processing in the framework of edge computing of large amounts of data. In the data pre-processing, data normalization methods are applied, which allow the data to be logically sorted, tagged, and linked, which also allows the data to be efficiently compressed, thus, dynamically creating a complex dataset for later use in the process digitization.
... e IoT has emerged as one of the most crucial 21st century technologies in recent years. Because of the capacity to connect mundane products such as household appliances, autos, thermostats, and baby monitors to the Internet via embedded devices, continuous conversation, processes, and things are now possible [27,28]. Because of the rise of cloud platforms, businesses and consumers may now receive the equipment they need to significantly increase without having to manage it all [29,30]. ...
Article
Full-text available
To prevent the occurrence of elevator safety accidents, in this study, an Internet of things-based elevator failure monitoring system is investigated. First, it introduces the Internet of things technology, preprocesses the relevant data, and extracts the features of the elevator operation data continuously collected by the elevator sensors. The objective of this paper is to study the application of IoT in elevators. Method. The Relief-F algorithm is used to evaluate the potential influencing factors. The results show that, as the batch size increases, the accuracy rate will gradually increase, but after more than 20, the accuracy rate will decrease. When the batch size is 20, the training result is the best. It can be seen that, as the time step increases, the accuracy of the prediction will be significantly improved. When the time step is 24, the prediction accuracy is the highest; after 24, the prediction rate will decline. In the diagram of the influence of learning rate on the model, the blue line indicates that the learning rate is 1.0, the red line is 0.1, and the black line is 0.01. With the increase of the iteration times, the effect is the best when the learning rate is 0.1. This system has high research value and broad application prospects and can make up for the current lack of monitoring in the elevator industry.
... Organizational: To implement DeveSecOps in any organization, this organization needs to adopt new skills, changes, culture, cutting-edge tools and technologies, required processes and policies, and DevSecOps practices [35]. A new skill is needed in the area of cryptography. ...
Article
DevOps revolutionize the software development lifecycle by providing agile and fast-paced solutions. DevOps ignores security prospects since it focuses only on increasing development and speed. DevSecOp is a notion of implanting Security into DevOps operation without distressing its agile nature by discovering contemporary security practices. This research aims to reveal a comprehensive overview of DevSecOp. Here we presented a brief overview of the research methodology. Afterward, it presented the method of gathering the required information. This research paper is distributed in the following section. Section II presented the research methodology, while section III provided results from this study. In the end, we conclude our research In this study, we discover essential DevSecOp concepts, leverages of DevSecOp, and potential research challenges in implementing it. We used a Multivocal literature review to explore the aforementioned subjects. For this Multivocal literature review, we searched grey data and, after processed that data, found answers to our research questions. This review concluded that DevSecOp, although challenging to implement, can be a constructive addition to the DevOps paradigm. DevSecOp is a relatively new concept that is not even fully concise in its name and definition. The key idea of DevSecOp is to implant security into DevOps procedures to make them more secure. We presented MLR on DevSecOp, keeping in mind pre-designed research questions. Since DevSecOp is not as popular and does not contain enough academic literature, we had to include grey data for our literature review. This MLR concluded that DevSecOp is mainly defined as integrating Security into DevOps
Article
Full-text available
Software development security refers to the practice of integrating security measures and considerations throughout the software development lifecycle to ensure the confidentiality, integrity, and availability of software systems. It involves identifying, mitigating, and eliminating security vulnerabilities and threats that could be exploited by attackers. The goal of this paper is to survey the various concepts and methodologies directed towards software security, and the identification of any missing gaps. Based on the findings, it is noted that the development of secure software requires a proactive and comprehensive approach. It begins with establishing secure design principles and incorporating security requirements from the initial stages of development. Here, secure coding practices, such as input validation, output encoding, and secure authentication and authorization mechanisms, are employed to prevent common security vulnerabilities. In addition, regular security testing, including penetration testing and vulnerability scanning, helps identify and address potential weaknesses in the software. Normally, code reviews and security audits are conducted to ensure adherence to secure coding practices and identify any security flaws. It is important that security training and awareness programs be provided to developers and other stakeholders to foster a security-conscious culture. To minimize potential vulnerabilities, secure configuration management, which involves properly configuring servers, networks, and dependencies may be utilized. On the other hand, regular updates and patching are essential to address known security vulnerabilities in software components. To guide their software development security practices, organizations may follow established security standards and frameworks such as ISO 27001 or NIST Cybersecurity Framework. By prioritizing software development security, organizations can protect sensitive data, prevent unauthorized access, and mitigate the risk of security breaches and incidents. In the long run, this helps build trust with users and stakeholders, enhances the reputation of the software, and reduces the potential impact of security incidents on the organization.
Chapter
In order to solve the problem that the recognition effect of traditional monitoring and recognition algorithms cannot meet the needs, a computer monitoring system based on Internet of things and neural network algorithm is proposed. Firstly, the basic functions and development status of the computer monitoring system are analyzed. Then, based on the study of the three-tier architecture and key technologies of the Internet of things, and based on the structure and characteristics of the computer monitoring system, the three-tier architecture of the computer monitoring system based on the Internet of things (sensing layer, network layer, and application layer) is put forward. Finally, according to the demand analysis of the real intelligent monitoring system, the overall framework of the server is designed, and the intrusion detection algorithm and wandering detection algorithm of the human behavior recognition algorithm based on the Internet of things and neural network are applied to the identification server of the intelligent monitoring system. The results show that the system can support more than 16 channels of real-time recognition through accelerated optimization. Compared with traditional intrusion detection, neural network algorithm can distinguish whether the intrusion subject is human body, and has better recognition effect and greater practical value.KeywordsNeural networkBehavior identificationIntrusion detectionWandering detectionInternet of things
Chapter
The emerging trends of cognitive Internet-of-Things (CIoT) are disrupting industrial process automation by infusing intelligence within the pervasive interactions and process automation of enterprise assets. Robotic Process Automation (RPA) is another fascinating technology trend playing a pivotal role in accelerating operational excellence across industries [1]. RPA solutions are designed to orchestrate service workflows that automate repetitive and rule-driven voluminous tasks. While the CIoT facilitates intelligent cyber-physical integration to enhance ubiquitous operational intelligence, RPA introduces automated workflows within the connected enterprise to maximize agility and resilience. As industrial computing is inclining towards maximizing situational awareness and autonomous operations, the integration of AI-powered IoT and intelligent RPA is paving the path to disrupting innovations in Industry 4.0 era. The paper delves into key technology components and architectural patterns that introduce a new breed of Cognitive enterprise systems enabling intuitive operations and need-based control functions beyond complex decision support and pervasive interlocking of Industrial IoT. We present unique architectural semantics that introduces RPA capabilities within CIoT to transform the actionable insights into context-aware process flows, promote interoperability, and execute prescriptive actions. The objective of the paper is to present the design rationale of next-generation industrial automation, compelling Industrial IoT use cases, and the research directions on autonomous systems achieved through such convergence of CIoT and RPA.Keywords IIoT CIoTRPAIoRTIndustry 4.0Industrial AutomationEdge Computing
ResearchGate has not been able to resolve any references for this publication.