Edge AI and Cloud Security: Enabling Secure and Scalable DevOps for Edge Computing

Authors

  • Venkata M Kancherla Independent Researcher, USA. Author

DOI:

https://doi.org/10.63282/3050-922X.IJERET-V3I1P107

Keywords:

Edge Computing, Edge AI, Cloud Security, DevOps, Scalability, Security Frameworks, CI/CD, 5G, IoT, Autonomous Vehicles

Abstract

Edge computing has emerged as a transformative technology, enabling low-latency, high-performance computing at the edge of networks, closer to the end-users. The integration of Artificial Intelligence (AI) at the edge, known as Edge AI, promises to revolutionize various industries, including autonomous vehicles, smart cities, and industrial Internet of Things (IoT). However, the widespread adoption of Edge AI faces several challenges, particularly in the areas of security, scalability, and performance. Cloud computing, which has long been a backbone for centralized data storage and processing, plays a crucial role in enhancing the security and scalability of edge-based systems. This paper explores the intersection of Edge AI, cloud security, and DevOps practices, which are critical for enabling secure and scalable deployment of Edge AI applications. Cloud security frameworks, including data encryption, authentication, and authorization mechanisms, are essential in mitigating the unique risks posed by decentralized edge environments. Moreover, DevOps methodologies offer the potential for continuous integration and deployment (CI/CD) of AI models at the edge, ensuring the rapid and secure delivery of updates and maintaining system performance. Despite these advancements, challenges such as network reliability, resource constraints, and secure DevOps pipelines persist. This paper also discusses emerging trends, such as the integration of 5G and AI-driven security solutions, which promise to further enhance the capabilities of Edge AI systems. The findings presented here aim to provide a comprehensive understanding of the current state of Edge AI, cloud security, and DevOps practices, and suggest potential areas for future research and development

References

[1] M. Satyanarayanan, "The emergence of edge computing," Computer, vol. 50, no. 1, pp. 30-39, 2017.

[2] D. L. Xie, Y. Xu, and C. Zhang, "Security and privacy in edge computing: A survey," IEEE Access, vol. 7, pp. 155791-155805, 2019.

[3] M. R. A. Kadir, M. A. I. K. Rahman, and M. R. Karim, "Secure data transmission in edge computing: A survey," IEEE Transactions on Cloud Computing, vol. 10, no. 4, pp. 1305-1319, 2020.

[4] L. Zhang, Y. Zhang, and J. Liu, "Edge AI: A survey on the integration of AI and edge computing," IEEE Access, vol. 8, pp. 105119-105137, 2020.

[5] S. Garg, N. Kumar, and R. J. Park, "DevOps practices for edge computing systems: A survey," IEEE Transactions on Industrial Informatics, vol. 16, no. 6, pp. 4154-4163, 2020.

[6] P. Rodriguez, M. Fernandez, and J. H. Kim, "Securing DevOps pipelines in the cloud for edge applications," IEEE Transactions on Cloud Computing, vol. 8, no. 3, pp. 1124-1137, 2019.

[7] R. S. Lee, D. Y. Lee, and J. Y. Kim, "Secure and scalable DevOps for edge computing systems," IEEE Transactions on Network and Service Management, vol. 17, no. 4, pp. 2645-2656, 2020.

[8] M. Javed, M. Z. Iqbal, and M. S. A. Khan, "Security challenges in edge computing: A survey," IEEE Access, vol. 7, pp. 31202-31212, 2019.

[9] Kumar and M. H. Rehmani, "5G and beyond: Security challenges in edge computing," IEEE Transactions on Green Communications and Networking, vol. 8, no. 3, pp. 1193-1204, 2020.

[10] S. S. Bhat, A. Sharma, and M. S. Gaur, "Cloud-assisted security in edge computing systems: A review," IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5269-5281, 2019.

Downloads

Published

2022-03-30

Issue

Section

Articles

How to Cite

1.
Kancherla VM. Edge AI and Cloud Security: Enabling Secure and Scalable DevOps for Edge Computing. IJERET [Internet]. 2022 Mar. 30 [cited 2025 Sep. 12];3(1):64-73. Available from: https://ijeret.org/index.php/ijeret/article/view/150