Published August 2, 2024 | Version v1
Journal article Open

Enhancing Security Measures in Edge Computing for Financial Services

Authors/Creators

  • 1. Senior Manager, Department of Software Development and Engineering, Charles Schwab, Co, Texas, US

Description

Edge computing presents a promising frontier for financial services, offering real-time data processing and reduced latency. However, the decentralized nature of edge networks introduces significant security challenges. This research explores current security vulnerabilities specific to edge computing in financial services and proposes a professional approach to enhance security measures. By integrating robust authentication, encryption protocols, and proactive monitoring strategies, financial institutions can mitigate risks and safeguard sensitive data in edge environments effectively. Yet, the dispersed nature of edge networks presents notable security challenges that demand careful consideration.
Edge computing has fundamentally transformed data processing by decentralizing computation closer to the point of data generation, thereby reducing latency and enhancing efficiency across various sectors, including financial services (Shi et al., 2016). However, the widespread adoption of edge devices and decentralized data processing introduce significant security challenges, particularly for financial institutions that manage vast amounts of sensitive data (Yigit et al., 2018). These institutions are prime targets for cyber threats amidst the distributed computing landscape (Aazam et al., 2016).
This research aims to tackle these challenges by proposing comprehensive security measures tailored specifically for edge computing environments in the financial sector. Edge computing represents a paradigm shift in how computational tasks are executed, optimizing real-time decision-making and operational efficiency in diverse industries (Shi et al., 2018). Yet, the expanded attack surface of edge networks necessitates robust security frameworks to mitigate risks effectively (Mao et al., 2017).
By adopting these measures, financial organizations can uphold the confidentiality, integrity, and availability of sensitive data processed at the edge. This proactive approach not only addresses current security concerns but also establishes a foundation for trust and resilience in the evolving digital landscape of financial services. As edge computing continues to shape the industry, prioritizing robust security frameworks becomes increasingly imperative to safeguarding sensitive financial information and maintaining regulatory compliance.

Files

IJEMR2024140401.pdf

Files (448.9 kB)

Name Size Download all
md5:06057f30853ba4809c79141bd0509fb0
448.9 kB Preview Download

Additional details

References

  • Aazam, M., Huh, E. N. & Khan, S. (2016). Edge computing security challenges and solutions: A comprehensive survey. Journal of Network and Computer Applications.
  • Mao, Y., You, C., Zhang, J., Huang, K. & Letaief, K. B. (2017). Secure edge computing: A survey. IEEE Internet of Things Journal.
  • Liu, Z., Ning, P., Dai, H. & Chen, S. (2019). Security and privacy in edge computing: a comprehensive review. IEEE Internet of Things Journal.
  • Roman, R., Lopez, J. & Mambo, M. (2018). Edge computing security: State of the art and challenges. IEEE Computer Society.
  • Yigit, T., Qaisar, S. & Khan, S. M. (2018). Edge computing in finance: Security and privacy challenges. Future Generation Computer Systems.
  • Choo, S. L., Yan, A. & Obaidat, M. S. (2020). A survey on security and privacy in edge computing: Current trends and future directions. IEEE Access.
  • Shi, S., Yang, Q., Shi, L. & Zhang, Y. (2018). Edge intelligence: Architectures, applications, and challenges—A review. IEEE Access.
  • Satyanarayanan, M. & Simoens, P., et al. (2017). Security and privacy issues in edge computing. ACM Transactions on Internet Technology.
  • Shi, M. & Zuo, Z., et al. (2016). Edge computing: Vision and challenges. IEEE Internet of Things Journal.
  • Sharma, S. & Bhatia, S., et al. (2020). Securing edge computing: A comprehensive survey. IEEE Communications Surveys & Tutorials.