Aug. 11, 2023, 6:10 a.m. | Mohammad Ali, Ximeng Liu

cs.CR updates on arXiv.org arxiv.org

In edge computing environments, app vendors can cache their data to be shared
with their users in many geographically distributed edge servers. However, the
cached data is particularly vulnerable to several intentional attacks or
unintentional events. Given the limited resources of edge servers and
prohibitive storage costs incurred by app vendors, designing an efficient
approach to inspect and maintain the data over tremendous edge servers is a
critical issue. To tackle the problem, we design a novel data inspection
approach, …

app attacks cache computing data distributed edge edge computing environments events inspection resources servers storage unintentional vendors vulnerable

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Consultant/Senior Consultant – Categoria Protetta L. 68/99

@ BIP | Italy

SoC Security Architect, Platform Architecture

@ Apple | San Diego, California, United States

Cloud Engineer II- SOC Analyst

@ Insight Enterprises, Inc. | Gurugram Gurgaon HR, IN