EDGE COMPUTING SECURITY USING ZERO TRUST EDGE ACCESS
Research Scholar, Department of Computer Science and Engineering, Annamalai University, Annamalainagar – 608002, email@example.com
Dr. R. Saminathan
Associate Professor, Department of Computer Science and Engineering, Annamalai University, Annamalainagar – 608 002, firstname.lastname@example.org
Research Scholar, Department of Computer Science and Engineering, Annamalai University, Annamalai Nagar – 608 002, email@example.com
Abstract —Internet of Things (IoT) device proliferation is altering how IT architects upgrade their infrastructures. There is little dispute that data and analysis have advanced to the edge, with a variety of sensors and tracking tools capturing data for practically every imaginable use, from smart cities and energy grids to industries, airlines, automobiles, and retail establishments. In addition to causing service interruptions, new edge computing potential risks such as horizontal assaults, account theft, entitlement fraud, DDoS attacks, and others can also cause other problems. A transformation toward the Zero Trust Security Architecture has been proposed in this work in response to the increase in cyber attacks experienced across these unprotected domains. The difficulties that security teams currently confront can be solved by the confluence of this shift.
Index Terms — Cloud Computing, Edge Computing, Threat detection, Machine learning and Deep learning techniques, Zero Trust Architecture.