How Edge Computing Transforms the Security of Cloud Computing
Abstract:
These days, network administrators are interested in delivering high performance network cores and edges, ensuring optimal visibility of services and simultaneously reducing to minimum the IT risk against network downtimes. The edge computing’s distributed architecture is an alternative to reduce the number of attack vectors. Transform network cloud services in edge computing components of cloud is fundamental because it is the best fit for latency-sensitive microservices. Identity enforcement/validation, for example, is a latency-sensitive task that all SECaaS applications could run at the edge for a superior end user experience. The ability to run latency-sensitive microservices may spawn a new generation of apps that will be developed with end-user proximity/location as a crucial design element. As a beginning point, to start the development of these new technologies, it is important the design of new models of analysis.
Año de publicación:
2019
Keywords:
- information security
- NETWORKING
- CLOUD COMPUTING
Fuente:

Tipo de documento:
Conference Object
Estado:
Acceso restringido
Áreas de conocimiento:
- Computación en la nube
- Ciencias de la computación
Áreas temáticas:
- Ciencias de la computación
- Religión
- Instrumentos de precisión y otros dispositivos