Aug. 25, 2023, 1:10 a.m. | Carmine Cesarano

cs.CR updates on arXiv.org arxiv.org

In recent years, there has been a shift in computing architectures, moving
away from centralized cloud computing towards decentralized edge and fog
computing. This shift is driven by factors such as the increasing volume of
data generated at the edge, the growing demand for real-time processing and
low-latency applications, and the need for improved privacy and data locality.
Although this new paradigm offers numerous advantages, it also introduces
significant security and reliability challenges. This paper aims to review the
architectures …

applications assessment cloud cloud computing computing computing architectures data decentralized demand edge generated hardening latency low moving security security assessment systems the edge

Cybersecurity Consultant

@ Devoteam | Cité Mahrajène, Tunisia

GTI Manager of Cybersecurity Operations

@ Grant Thornton | Phoenix, AZ, United States

(Senior) Director of Information Governance, Risk, and Compliance

@ SIXT | Munich, Germany

Information System Security Engineer

@ Space Dynamics Laboratory | North Logan, UT

Intelligence Specialist (Threat/DCO) - Level 3

@ Constellation Technologies | Fort Meade, MD

Cybersecurity GRC Specialist (On-site)

@ EnerSys | Reading, PA, US, 19605