Empowering Edge Security An Advanced Encryption Strategies for Enhanced Cyber Resilience in Edge Computing

Main Article Content

Nadica Stojanovic
Ritika Dhabliya

Abstract

Edge computing is quickly becoming popular in many fields because it promises lower delay and better performance. There are, however, serious security worries about the growing number of edge devices, especially when it comes to the safety and accuracy of data. This paper suggests using more complex encryption methods to make edge computing settings safer online. Traditional encryption methods, like AES (Advanced Encryption Standard), work, but they might not be enough to keep things safe in edge settings that change a lot. It is important to have lightweight encryption methods that can balance security and speed because edge devices often work in settings with limited resources. Hybrid encryption, which combines symmetric and asymmetric methods, is one way to do this. This makes it possible to secure data quickly with symmetric keys, while asymmetric keys are used to handle and trade keys, which improves security overall. It is also possible to use temporary key sharing methods to make the system even safer. Keeping track of encryption keys is another important part. Traditional ways of managing keys might not work well in edge computing, where devices are spread out and often move around. So, the study suggests using decentralized key management systems (DKMS) to make it safe to create, share, and remove encryption keys in edge settings. The study also talks about how safe startup and authentication methods are important for making sure that edge devices are trustworthy. Potential security risks can be lessened by making sure that devices are real and functioning properly before letting them connect to the network. The advanced encryption strategies that have been suggested, such as hybrid encryption, autonomous key management, and safe startup methods, can make edge computing settings much more secure online.

Article Details

How to Cite
Stojanovic, N. ., & Dhabliya, R. . (2023). Empowering Edge Security An Advanced Encryption Strategies for Enhanced Cyber Resilience in Edge Computing. Research Journal of Computer Systems and Engineering, 4(1), 74–83. https://doi.org/10.52710/rjcse.65
Section
Articles