3.8 Proceedings Paper

Adaptive Security Risk Mitigation in Edge Computing: Randomized Defense Meets Prospect Theory

Journal

Publisher

IEEE
DOI: 10.1145/3453142.3493511

Keywords

Edge computing; risk mitigation; stochastic game; prospect theory; adaptive security

Ask authors/readers for more resources

This paper addresses the challenge of ensuring the security and privacy of computations in edge computing through an adaptive approach of defense randomization. The results demonstrate that a non-deterministic defense policy yields better security compared to a static defense strategy.
Edge computing supports the deployment of ubiquitous, smart services by providing computing and storage closer to terminal devices. However, ensuring the full security and privacy of computations performed at the edge is challenging due to resource limitation. This paper responds to this challenge and proposes an adaptive approach to defense randomization among the edge data centers via a stochastic game, whose solution corresponds to the optimal security deployment at the network's edge. Moreover, security risk is evaluated subjectively based on Prospect Theory to reflect realistic scenarios where the attacker and the edge system do not similarly perceive the status of the infrastructure. The results show that a non-deterministic defense policy yields better security compared to a static defense strategy.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available