Enhancing Zero Trust Security in Edge Computing Environments: Challenges and Solutions

Fiza Ashfaq, Abdul Ahad, Mudassar Hussain, Ibraheem Shayea, Ivan Miguel Pires*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Improving Zero Trust Security in Edge Computing Environments presents unique problems and necessitates novel solutions to secure sensitive data and lessen the dangers associated with edge computing installations. This article explores the challenges and solutions for improving Zero Trust Security in edge computing environments. The distributed and heterogeneous nature of edge ecosystems, limited resources, dynamic and mobile nature, scalability and performance concerns, network latency and bandwidth constraints, and scalability and performance concerns contribute to the challenges. Careful analysis and specific security solutions are needed to achieve a solid security posture. Several ways to overcome these issues include identity and access management mechanisms, secure network segmentation, continuous monitoring and threat detection systems, and authentication and authorization technologies. Zero Trust Security must be integrated with edge computing architectures for effective deployment. Edge security gateway and firewall systems provide perimeter protection for edge settings, while cloud-based security services and threat intelligence improve threat detection and response capabilities. The article also includes case studies and recommended practices, exploring lessons gained and ideas for implementing Zero Trust Security in edge computing settings. Future directions and emerging trends in Zero Trust Security for Edge Computing are investigated, offering insights into the growing security landscape in edge settings.

Original languageEnglish
Title of host publicationGood Practices and New Perspectives in Information Systems and Technologies - WorldCIST 2024
EditorsÁlvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Maranda
PublisherSpringer Science and Business Media Deutschland GmbH
Pages433-444
Number of pages12
ISBN (Print)9783031602207
DOIs
Publication statusPublished - 2024
Event12th World Conference on Information Systems and Technologies, WorldCIST 2024 - Lodz, Poland
Duration: 26 Mar 202428 Mar 2024

Publication series

NameLecture Notes in Networks and Systems
Volume987 LNNS
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

Conference

Conference12th World Conference on Information Systems and Technologies, WorldCIST 2024
Country/TerritoryPoland
CityLodz
Period26/03/2428/03/24

Bibliographical note

Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.

Keywords

  • Edge Computing
  • Edge Computing Environment
  • Security
  • Zero Trust
  • challenges and solutions

Fingerprint

Dive into the research topics of 'Enhancing Zero Trust Security in Edge Computing Environments: Challenges and Solutions'. Together they form a unique fingerprint.

Cite this