By Rob May
What is edge computing and what about security?
Edge computing means running fewer computing processes in the cloud and moving those processes (and data) closer to where it is being consumed, thus reducing latency and bandwidth use by minimising the amount of long-distance data transfer between a client/device and a server (sometimes thousands of miles away).
The development of edge computing was due to the exponential growth and demands of IoT (Internet of Things) devices, which connect to the internet for sending and receiving data from the cloud. But the rise of real-time applications that need processing at the edge and technology like 5G are rapidly driving the technology forward
We often take much of this technology for granted, however when we start to think of applications that can have a real impact on human life, such as self-driving cars, medical devices or aircraft systems, there is an absolute need for these to react in real-time, thus reducing the latency of data processing is critical.
Edge computing hardware and services help resolve the problem by processing and storing data locally. An edge gateway can process data from an edge device, and then only send any relevant data back to the cloud for storage which saves on bandwidth.
The definition for the edge of the network is a bit incongruous; some people think of the processor inside an IoT device as the network edge, but a router, an ISP, or a local edge server also fall into the definition. The key thing is proximity, with the edge of the network being physically close to the device and where it communicates with the internet.
Growth, demand and potential cybersecurity threats
This constant growth and demand on processing and enormous storage requirements is driving growth and expansion in data centers and hybrid-cloud and whilst we see huge scale adoption of public cloud, private cloud and small local data centers has never seen so much demand.
A critical subject that the industry and its users must continue to focus on and develop is cybersecurity and the need to ensure a perennial agenda item for security and resilience. Edge computing is another factor in our digital lives that increases attack vectors and widens the threat surface.
In the workplace and in our domestic lives we continue to introduce more connected "smart" devices, and as we’ve increased the number of edge servers and IoT devices which contain built-in computers, there are copious opportunities for malicious hackers to attack and compromise these devices. It is imperative that data centers (of all sizes) are equipped to face the security challenges of our interconnected digital world.
An issue often joked about with the Internet of Things is that IoT is actually an acronym for the Internet of Threats! Part of the challenge is consumers not considering the security risks of what they are buying and deploying. Another is the physical challenge in a world where we do not easily have authentication by credentials or authority, such as a human individual, it’s essential that we figure out different ways to protect data.
Certainly, data at the edge needs appropriate deliberation, consider that it is often being handled by many different devices and by default may not be as secure as a centralised or cloud-based system. As we see the number of IoT devices continue to grow, it is a fundamental requirement that the industry works hard to understand any potential device security issues, and to make sure those systems can be properly secured. Data encryption is vital along with appropriate security protocols and the correct access-control methods.
Enabling the edge with experts
Edge computing inevitably requires increased local hardware. Consider that whilst something like an IoT camera needs an integral computer to send its raw video data to a web server, if we want that device to run its own motion detection algorithms it would need a much more sophisticated computer with increased processing power.
To meet the challenges outlined above, data center technology must continue to evolve: we need to look for optimised storage capacity, deploy faster servers, and ensure widespread use of hardware encryption and more effective compression. Simply transitioning from SAS (Serial Attached SCSI) to SATA or NVMe Enterprise SSD (Solid-State Drives) can have a dramatic impact in reducing power usage when extrapolated up to the level of entire data centers.
We will also see more widespread use of 3D NAND (or V NAND) which is high-performance, high-capacity, and high-scalability, flash technology stacking a type of non-volatile flash memory chips on top of each other (the memory cells are stacked vertically in multiple layers). The purpose of this technology is to make devices faster, have greater capacity, whilst running more efficiently using less energy.
Navigating this increasingly complex IT ecosystem is far simpler when you can call on the services of a reputable hardware vendor; a supplier of memory and storage products who happily works with you on a personal level to ensure that the products you are purchasing align with your short, medium, and long-term IT and business goals. This is where Kingston Technology's "Ask an Expert" Team excels.
With over 30 years’ experience, Kingston has the knowledge, agility, and longevity to fully enable both data centers and enterprises to respond to the challenges and opportunities presented by the increase in 5G, IoT and edge computing.
#KingstonCognate introduces Rob May
Rob May an award-winning speaker, delivers keynotes internationally and runs CEO and Director workshops for numerous business leadership organisations in Europe. He speaks as a current and very relevant expert being founder and Managing Director of ramsac, with a team of 75 consultants working with him (and an alliance partnership with PwC) to deliver IT and Cyber security services/support (and have done so for 29 years). Rob is the UK Ambassador for Cyber Security for the Institute of Directors and he is ranked No. 5 in the Global rankings for Cyber Security Thought