You are on page 1of 9

Edge Computing Systems and Architectures

Praveen Kumar Ummidi


Undergraduate Student
Computer Science and Engineering
Lovely Professional University, Phagwara

Abstract—Edge and fog computing will become more


common in the upcoming years as a result of the advantages
they have over standard cloud computing in a variety of
specialized use-case scenarios. However, the security issues functional servers with multiple CPU cores, numerous GPU
that Fog and Edge Computing raise have not yet been cores, and gigabytes of RAM.
properly considered and addressed, especially when Although the two current network paradigms (Cloud and
considering the supporting technologies (such virtualization) Edge/Fog) have relatively similar use-cases, the context of
necessary to enjoy the rewards of the adoption of the Edge usage for the apps and various types of devices used in the
paradigm. Containers, Real Time Operating Systems, and architecture could be extremely different. Because of this, it
Unkennels are far from being sufficiently resilient and safe. is necessary to assess the security risks associated with
In this paper, we introduce the key technologies supporting virtualization, which have been thoroughly researched for the
the Edge paradigm, survey existing issues, introduce cloud environment.
pertinent scenarios, and discuss the advantages and In order to reduce the Time-to-Market for both hardware and
limitations of the various existing solutions in the scenarios. software developers, edge and fog devices increasingly rely
Our goal is to shed some light on current technological on Linux technology, whether it be a regular server
limitations and to offer some guidance on future research distribution or an embedded operating system. This is due to
security issues and technological development. Lastly, we Linux's demonstrated dependability, extensive ecosystem,
explore the security concerns that currently exist in the and wide range of available technology solutions (such as
setting that was just described and attempt to identify virtualization). Although there are other technologies
potential future research areas in both security and available today, the tendency in software is towards
technological development in various Edge/Fog scenarios. consolidation, so it is frequently more practical to reuse as
Keywords-Edge Computing; Containers; Unikernels; RTOS; much of the tried-and-true solutions, especially when it is
Security. possible to remove extraneous components.
In order to provide more dependable and effective services,
I. INTRODUCTION resources on Edge/Fog servers are rapidly being produced
employing virtualization technologies. Notwithstanding the
Despite its widespread acceptance, resource centralization is above listed advantages, one should not forget the potential
a major drawback of cloud computing, which makes it far security risks generated by the very use of virtualization; if
from a universally applicable solution. Because delay- such issue is not adequately addressed, they could hamper the
sensitive applications like gaming, augmented reality, and e- full realization of Edge potential.
health demand low latency and jitter as well as context Contribution: This paper's major goal is to analyse the
awareness and mobility support, this in turn results in an effects of virtualization technologies on the Edge/Fog
increase in the distance between user devices and their network architecture, outlining their benefits and exposing
clouds, causing large average network latency and jitter. By the security risks they provide. To do this, we first grouped
shifting computing and storage away from centralized the equipment utilised at the Edge and Fog levels and
locations, the distributed computing paradigm known as edge assessed how well it supported virtualization. We next
computing was developed to alleviate some of the problems assess those technologies in the context of four typical real-
[2]. world Edge Computing use-case scenarios after reviewing
By shifting computing and storage away from centralized the general security issue of both the most popular
locations, the distributed computing paradigm known as virtualization technologies (i.e., containers and unikernels)
"Edge Computing" was developed to address some of the and the rival non-virtualized method (RTOS). Lastly, we
problems [2]. Edge computing moves data, services, and try to clarify potential future research areas and workable
applications closer to the locations where such services are solutions that might have an impact (either positively or
needed. Fog Computing, in particular, makes use of Edge negatively) on the overall security of the Edge/Fog
devices to do the majority of local processing, storage, and paradigm.
communication. These gadgets range in size from tiny Roadmap. The rest of this essay is structured as follows.
Internet of Things (IoT) or Internet of Everything (IoE) [3] The Edge and Fog architectures are discussed in Section II,
platforms with a single CPU core and less than a Megabyte while Section III describes the current supporting
of Memory to fully technologies. The real-world scenarios that we consider
throughout the remainder of the paper are illustrated in devices. Virtualization technology is not supported
Section IV. The security concerns relating to the auxiliary by this.
technologies covered in the preceding sections are discussed
in Section V. Section VI offers a thorough analysis along
with intriguing potential possibilities for the future, and
Section VII makes some closing observations.

II. ARCHITECTURAL BACKGROUND


In this section we provide an overview of both the Edge and
Fog Computing architectures, discussing their properties,
differences, and hardware requirements.
These two paradigms do not have a single, widely
acknowledged definition; instead, they have numerous, errant
descriptions that occasionally overlap. This ambiguity is
Figure 1. Edge/Fog Devices and their relative placement
most likely caused by the fact that both systems aim to move
the computation closer to the data source. In fact, the Category Architecture Example Devices
Virtualization
Support
traditional cloud architecture, in which data are transferred Constrained MSP430,
Arduino,

Telos,
Devices Arm
across long distances to be processed, has to be changed in Open Mote
Single board x86-64, Raspberry Pi,
order to provide the low latency performance that modern computer Armv8 Intel NUC

end-user applications demand. Data are processed (also Mobile


Arm,
Armv8
Android/IOS
Smartphones
Not yet

partially) in the same device that produced them or in an Table I


ARCHITECTURAL SOLUTION FOR EDGE COMPUTING DEVICES
external device, but at the edge of the same network,
according to the Edge Computing architecture. Instead, in the device category. In actuality, these devices have
Fog network model, data are processed outside the network, extremely few resources accessible because of some
yet extremely close to where they were originally collected. limitations, including production costs or physical
Both names are used interchangeably throughout the restrictions on characteristics like size, weight, and
remainder of this essay because we will be discussing both. available power and energy (at most 50Kb of RAM and
In the section that follows, we categorize the hardware that 250Kb of storage) 1. Instead, due to their architecture
could be utilized at the Edge and Fog levels, as shown in Fig. and the resources at their disposal, single-board
1, to properly comprehend the effects of virtualization computers like the Raspberry Pi or the Intel NUC fully
technologies on the Edge/Fog network paradigm. Based on support both hardware and software virtualization.
the hardware design and the current implementations, we Despite having an architecture that fully enables
discuss the virtualized support that each device category virtualization, mobile devices do not currently have any
currently offers. Collaboration: Cloud-based tools allow for implementations that do.
easier collaboration among team members, regardless of their 2) Edge/Fog Servers: General purpose servers (i.e.,
location. the same servers used in cloud environments), new
Edge/Fog hardware Devices that produce raw data (e.g., platforms especially created for the Edge/Fog
sensors), receive processed data (e.g., end-user devices like requirements, and other platforms created for specific
smartphones), and provide computational power or other use-cases (i.e., auto- motive), are three major categories
services make up the three sorts of devices that are part of the in which to place the devices that could be used as
edge computing level (i.e., servers). In contrast, the Fog servers in both the Edge and Fog levels. Table II lists
network concept simply consists of servers because data are these categories, provides samples of products that may
created and used at levels below. be purchased, and emphasizes the support for
1) Edge Devices: Every device that produces data virtualization that is provided. Existing Edge/Fog
and/or runs an end-user application falls under this servers, sometimes known as cloudlets, are scaled-down
category. These devices can be divided into three variants of cloud servers that are primarily built on CPUs
basic kinds, as shown in Table I: restricted devices, and one or more GPU co-processors. These devices are
single-board computers, and mobiles. Any IoT primarily designed for batch processing of in-memory
device utilized for various purposes, such as data, making it difficult for them to deliver stable or
domotics, surveillance, automotive, and many predictable performance while processing streaming
others, falls under the category of restricted data from I/O channels. To process streaming data from
diverse I/O channels at low power consumption and particular recipients, known as containers, is made possible
good energy efficiency, future Edge servers will require by containerization, a lightweight alternative to complete
a new general-purpose computing system stack [4]. The virtualization. The idea of a container is not new; it has
Openfog Consortium outlines the Fog reference evolved over time to take on many forms depending on the
architecture in [5]. Despite the lack of a standard Fog level of isolation it offers. In contrast to virtualization,
device, Intel created the Fog Reference Design (FRD), a containers provide performance that is almost equal to that
device that complies with the reference architecture. The of bare metal since they are standardised software units
that contain both the running code and its associated
FRD and Cisco Edge Compute Devices IOx [6] both use
dependencies [8], [9]. This logical packaging approach
the Field-Programmable Gate Array technology (FPGA)
separates programmes from the infrastructure, making it
to cast proprietary hardware in a chassis, allowing users
possible to deploy container-based applications
to both configure and program it after production [7]. consistently and effectively independent of the
Both the general-purpose servers and the Edge/Fog environment (e.g., a data center, a laptop, a raspberry Pi, to
bespoke platforms fully support virtualization due to their name a few). Like regular processes, containers are able to
reliance on an x86-64 architecture. Nevertheless, the share libraries with the host and execute directly on the
virtualization possibilities for other platforms depend on host kernel to avoid duplicating code [9]. The most popular
the vendor support offered. For instance, the manufacturer software container platform in the world, Docker, offers a
offers a hypervisor for the Nvidia drive board listed in systematic technique to automate the deployment of
Table II that can run either an operating system or a bare applications inside portable containers [10].
metal application2. Real-Time Operating Systems (RTOSes): We use the term
"real-time operating systems" to refer to any operating
system that can run real-time applications, or programmes
Category Product
CPU Virtualization that need both a high level of reliability and exact timing
Architecture Support
Automotive
Nvidia Drive
Armv8-A Vendor Limited
[11]. Despite some open-source initiatives, the majority of
PX 2 (Tesla)
Intel Fog RTOS developments are proprietary solutions. They typically

Edge/Fog Reference x86-64
Customize Design have a very slim and straightforward kernel that controls the
d Platform Unit IOx Edge
Cisco
Compute Devices
x86-64 ✓ underlying hardware alone (i.e., they are bare metal in that
Cloud Device Generic Server x86-64 ✓ they do not support virtualization mechanisms). Every key
Table II function carried out by the Operating System (such as OS
ARCHITECTURAL SOLUTIONS FOR E DGE /F OG S ERVER
calls and interrupt handling) must have a maximum time
. restriction in order to be called real-time . A first classification
of real-time operating systems (RTOS) is made as a result of this
time management (see also [12]): a Hard Real-Time Operating
III. SUPPORTING TECHNOLOGIES
System (HRTOS) is always able to guarantee a maximum time for
each of the critical operations, whereas a Soft Real-Time Operating
This section gives a high-level overview of the virtualization- System (SRTOS) is able to guarantee a maximum time for each of
supporting technologies now available that can be the critical operations the majority of the time [13]. Moreover,
incorporated into the Edge Computing networking RTOSes have two standard designs: I event-driven, where job
switching is based on higher priority occurrences, and (ii) time-
architecture. We consider the concepts and technologies of
sharing, where task switching is based on regular clock activity. For
containerization, unkennel, and Real Time Operating services that demand constrained response times, RTOSes may be
SySystemsas shown in Figure 2. The use of these advantageous for Edge Computing [14].
technologies in the Edge/Fog network model is then covered. Unikernels: The Unikernel method, also known as Library
OS [15], develops customized, single-purpose, single-
address-space images by relocating the OS services that
applications are based upon into the same address space as
the applications themselves. The plan is to completely
overhaul the way virtual machines are built, replacing "fat"
machine images with compact, safe, quick, and reusable
ones. The concept is founded on the observation that most
internet services, such DNS servers, are built on bulky
Figure 2. Supporting HW/SW Architectures images with libraries that are never used by the service
itself. The "thinning out" of the libraries produces safer
Containerization: The encapsulation of applications into pictures (i.e., a significantly smaller attack surface), which
ultimately results in the resource optimization of the potential advantages over the conventional cloud
computers that host them. The developer must select the architecture.
bare minimum set of operations required for the application Cloud Gaming and Augmented Reality: The number of video
to function in order to deploy the application within an gamers who are actively playing games worldwide is
image. In order to create sealed images that can operate predicted to reach 2.73 billion by 2021 [17], representing a
directly on the hardware or a hypervisor (i.e., without an market worth more than $50 billion globally [18]. This
intermediary Operating System), these libraries are sparked the development of ground-breaking applications
compiled into the application executable using a library
that allowed the blending of computer-generated data with
operating system [16].
actual reality [19], also known as augmented reality
Virtualization at the Network's Edge: The Edge/Fog servers
applications. Nevertheless, the spread of these kinds of
can employ the virtualization-supporting technologies
discussed in earlier sections to deliver services that are more applications has been hampered by the current network,
scalable, dependable, and performant. Figure 3 shows a storage, and processing constraints. Due to network capacity
typical use-case. Instead of sending raw data to the cloud, restrictions and the excessive delay brought on by the
IoT sensors deliver it to Edge/Fog servers where they can infrastructure's geographic remoteness, the currently used
then receive orders (solid lines). These servers are physically Internet infrastructure is not suited for augmented reality.
adjacent to or directly connected to the IoT network gateway Edge computing usage has the potential to change the
(Edge) or to a location outside the IoT network (Fog). In situation. In fact, by allowing data to travel a shorter
order to create on-demand services, virtualization distance, this network infrastructure would provide a more
technologies are employed to assure the network's scalability immersive and participatory gaming experience (i.e., with
by launching a tailored VM or container now of the request. reduced latency and lag times) [18].
If the end-user service is not locally hosted, the servers Smart Homes and Cities: Sensor devices and actuators are
elaborate and aggregate the data collected before delivering becoming more common in our homes and cities. Distributed
the results to the cloud. Instead of sending requests to the
intelligence that can scale along with the number of managed
cloud, end-user applications running on smartphones and
devices without affecting functionality and usability is
other client devices deliver them to Edge/Fog servers (dotted
required for managing and orchestrating data and controlling
lines), which reduces latency and enhances user experience.
such an ubiquitous and diverse landscape. For these kinds of
needs, edge computing can be crucial because it speeds up
response times to external stimuli by performing local
computations and data buffering/caching.
E-health: The word "e-health" can refer to systems and
services that allow for the real-time monitoring and exchange
of patient data, as well as events brought on by gadgets that
are either attached to or extremely near the patients
themselves. Several of these gadgets can ask for human
intervention from medical professionals or (re)act
automatically. Examples of applications include remote
diagnosis and therapy, direct patient care delivery, and
remote monitoring of patients' functions. A network
connection to other systems is a requirement for such
intelligent medical devices. Failures or delays in the
Figure 3. Virtualization on Edge/Fog Computing Architecture operation of these devices and/or the supporting network may
result in patient harm or injury, or even death. As a result,
IV.USAGE SCENARIOS dependable and low latency services and devices must be
We introduce four real-world use-cases in this section— used to deliver e-health. Due of its ability to shorten patient-
Cloud Gaming and Augmented Reality, Smart Homes and hospital interaction periods, edge computing can be crucial to
Cities, E-Health, and Network Function Virtualization, meeting this need.
respectively—that support the application of virtualization Network Function Virtualization: Network Function
technologies. We examine the adoption of the Edge Virtualization (NFV) is a technology introduced to
Computing paradigm for each use-case and highlight overcome the limitations of classic network architectures,
characterised by proprietary heterogeneous devices that are
usually very expensive both to deploy and manage. vulnerabilities in the Docker ecosystem. As their initial
Leveraging virtualization technologies, NFV decouples contribution, they classify related studies in the literature
software from hardware, allowing the execution of modular into several macro-categories, including comparisons of
applications on standardised server platforms. Every containers and virtualization, security features of
network service may be broken down using this technology containers, protection against specific attacks, vulnerability
into a collection of virtualized services that are implemented analysis, and use-cases-driven vulnerability analysis. Then,
in software and operate on regular physical servers. Then, using several use-cases—each of which explains a distinct
instead of having to buy and install new hardware, those way to utilise Docker—they look into security problems
virtualized functions might be moved and instantiated at associated to the Docker ecosystem. As a result of their
geographically distinct network sites [20]. In addition to cost research, the authors classify vulnerabilities into five
reductions, NFV offers a flexible method for designing, categories: unsafe production system configuration; image
developing, distributing, and managing network distribution; verification; and decompression. vulnerability
applications. Similar technology may be applied to edge in the image storage process, a vulnerability that is directly
computing to deliver services that are more effective and related to Docker, a vulnerability inside the image, and a
scalable. vulnerability in the Linux kernel, respectively. Protect
container from applications, protect container from other
containers, protect host from containers, and protect
VIRTUALIZATION-ORIGINATED containers from host are the four basic use-cases that
SECURITY ISSUES authors in [22] consider. The authors analyse potential
In this section, we examine the security ramifications of solutions and identify potential associated threats for each
using the techniques described in Section III. We assess the use-case. The terms semi-honest and malicious are taken
security analysis provided in the literature for each of the from [22]; according to the authors, a malicious adversary
enabling technologies, namely containerization, Real Time is one who has the ability to deviate from the protocol in
Operating Systems, and unkennels, and we identify new, order to both obtain information and compromise the
intriguing security challenges that the adoption of each system, while a semi-honest adversary is a passive
technology could bring. Table III shows a scenario-driven adversary who can cooperate to obtain information but
examination of potential assaults. Each row in the table cannot do so. to both get information and hack the system,
illustrates a scenario that might occur and lists the destructive stray from the protocol.
activities that an attacker might take to compromise privacy RTOS: RTOSes must keep the complexity of controlling
or disrupt the system, depending on the underlying hardware and applications to a minimum in order to
technology that has been implemented. Because RTOS do guarantee constrained execution times. They are mostly event
not enable numerous application images or their dynamic driven and quick to respond to occurrences as a result.
(re)deployment, the Real Time Operating Systems column is Despite this, due to their simplicity, RTOSes are still
missing from the table given above. They are more susceptible to a number of attacks [12], including DoS attacks
vulnerable to any vulnerability brought on by the lack of (where a running process can block shared memory and
security patches or updates than containerization and cannot typically be stopped), code injection (where the
unkennels. command flow is changed to execute malicious code), and
Containerization – Docker: The widespread adoption of data exfiltration (where memory isolation is typically not fully
containerization in recent years, particularly Docker, has enforced by RTOSes, relying instead on a straightforward
paved the way for a number of research targeted at shared memory layout.
identifying the potential security risks and related Unikernel: To the best of our knowledge, [32] is the only
vulnerabilities. Table III additionally shows a few potential piece of writing that offers a thorough analysis of the
pertinent assaults connected to the literature-researched security concerns with the unikernel strategy. The author of
Docker use-cases. Security is one of the main objections to this study first discusses the history of virtual machines,
the use of containers, and the quantity and severity of the unikernels, and hybrids, respectively, before analysing the
identified attacks provide an explanation. security isolation features of each technology.
One of the earliest studies that examines Docker's security
is [21], where the author evaluates Docker's security as Table III
well as its relationship to the Linux Kernel's security MOST RELEVANT SCENARIO-DRIVEN ATTACK IDENTIFICATION
features. The authors of [9] offer a thorough analysis of the
Scenario Description Possible Attacks (Docker) Possible Attacks (Unikernel)
Protecting Each ap pl ication can be. Remote code execution; unauthorized access. Unikernels ru n t h e im age at ring 0 (or
from untrusted malicious, semi-honest, or honest, network-based intrusions; virus, worm, trojan, ransomware; equivalent). As such are fully exposed to malicious
applications inside respectively. Fur- thermore, it is information disclosure, tampering, and privacy issues; privilege code in images. Nevertheless, the isolation provided by
images assumed there are applications escalation, denial of service ([9], [21]– [23]). the hypervisor us- ing hardware-assisted virtualization
that require root privileges. helps reducing the tampering and data access, as well
as privilege escalation issues [24].

Inter-image protection Images can be semi- DoS on other images; ARP spoofing; MAC flooding. DoS and other attacks on images are fea-
honest or malicious and placed port/vulnerability scanning; remote code execution ([ 9], [22], sible. Nevertheless, the isolation provided by ring -1
inside one or different hosts. [23]). (or equivalent) might be used to contain the attack.

Protecting host It is assumed that at least. Attacks on unnecessary services; container escape The h o s t s y s t e m ( hypervisor) r u n s a t a
from images one image is semi-honest or attacks; DoS; data tampering ([9], [22]). higher privilege level, as such the possible attack are
malicious within a host. related to hypervisor vulnera- bilities as in the regular
VM+hypervisor scenarios.

Protecting image Images are honest but the Profiling in-image application activities; unauthored access for Unikernels here have the same issues as
from host host is either semi-honest or image data; changing the image behavior ([22]). containers, unless SGX [25] or similar tech- nology is
malicious used.
Microservices- Each image hosts a single Zip-bomb-like attacks; remote code execution; virus, Unikernels are vulnerable as well, but priv-
like service in a single process. warm, trojan, ransomware; privilege escalation; ac- count ilege escalation is more difficult and it has to resort to
hijacking; network communication tampering ([9]) some kind of hypervisor vulner- ability.

Application Image Using Docker as a way Data leakage; DoS; DoS on other containers; attacks Unikernels are equally vulnerable to third-
Distribution of shipping virtual on the container integrity; privilege escalation; con- trainer escape party image hosting. Only privilege escala- tion is
environments. attacks ([9]) harder (unless some CPU backdoor is leveraged by the
hosted code [26]).
Image Docker integration pro- Data leakage; DoS; DoS on other containers; Zip- Same as above, like containers but
deployment on the vided by the main Cloud bomb-like attacks, remote code execution; virus, warm, trojan, potentially more isolated when deployed.
Cloud Providers. ransomware; privilege escalation; ac- count hijacking; network
communication tampering ([9]).

Image repository Each image has been pro-. Zip-bomb-like attack; remote code execution; virus, Same as above, similar to containers but
vided by a repository through a warm, trojan, ransomware; privilege escalation; data leakage ([9], potentially more isolated when deployed.
distribution process [22], [27]– [30]).

Table III
MOST RELEVANT SCENARIO-DRIVEN ATTACK IDENTIFICATION

Table IV

EDGE-IOT SCENARIOS, REQUIREMENTS, AND SECURITY IMPACT [31]

Scenarios Tech Performance Fitness Security Impact

Cloud Gaming RTOSes and containers fit better as they provide slightly less overhead (read:latency) Low security impact, as attacks would mostly just cause a DoS
Virtual Reality than unikernels in the game being played.

Smart home Containers and unikernels are equivalent, with a small advantage of unikernels for Here the consequences of a successful attack can be more serious
Smart Cities security isolation and an advantage of containers for the ease of setup. RTOSes are e.g., up to the house catching fire or some DoS in the
relevant only for constrained devices surveillance cameras.

E-Health Unikernels have a small advantage over containers due to the increased security Vital is the keyword, as DoSes and malicious soft- ware/device
isolation/resilience that is crucial in this contest. RTOSes could be adopted only in can possibly cause harm to the patient.
some corner case on constrained devices.

NFV Containers and unikernels are roughly equivalent, with a small advantage of unikernels The impact on security is relevant as Malicious/altered software
for security isolation and an advantage of containers for the ease of configuration; might cause relevant DoSes to other applications relying on the
RTOSes are still relevant but suffer from difficult updates network.
VI. DISCUSSION AND FUTURE DIRECTIONS significant DoS attacks or other serious problems that might
call for the re-deployment of devices.
This section compares the supporting technologies provided
in Section III to the real-world use cases introduced in
Reliability, security, and privacy are required for the E-
Health use-case. Unikernels therefore seem to be the most
Section IV. The objective is to comprehend how the use of appropriate option, utilising the smaller attack surface and
these technologies might impact the particular scenario in simplicity of updates, and the performance improvements of
relation to two key factors: performance and security. In RTOSes and unikernels may be left aside. The option that
table IV, the findings of this investigation are enumerated. was just made implies that in order to sustain, develop, and
ensure the success of this technology, increasing amounts of
The issue of security software upgrades is common to all work will be required to streamline image development,
the use-case situations. Deploying security fixes must really upgrading, and administration of unikernels [36].
be made easier and more automated over time since new
vulnerabilities must be fixed often and, ideally, with the least Some thorough examples of the Network Function
amount of delay possible. The flexibility provided by the Virtualization scenario are given below.
extra layers between application images and the hardware
may be used by containers, but even more unikernels, to offer The Domain Name System (DNS), a decentralised
seamless patching. RTOSes can theoretically be upgraded, hierarchical system that provides translation services between
however this procedure often calls for physical access to the users and Internet-connected resources, is the subject of the
hardware and direct involvement. Hence, the scalability of first illustration. The IP address of the requested resource is
software updates is somewhat constrained. given to the user by the DNS server in its conventional
implementation, in accordance with its database. The DNS
As cloud gaming and virtual reality use cases become more and end-user services are two examples of the new class of
prevalent (see the initiatives by Google and others [35]), sophisticated services that may be developed thanks to NFV.
assuring speed is more important than protecting the integrity This technique may be used to operate microservices, which
of the code and data. To maximise this dimension, methods are only operational after a DNS resolution. Jitsu [37], a DNS
like RTOSes and unikernels can be appropriate. On the one server that immediately boots virtualized instances of the
hand, RTOSes, such as proprietary solutions, are often more resource the user has requested, is a nice example. A virtual
expensive and, as was already said, have more difficult machine is immediately started when Jitsu gets a DNS
software upgrades, even though they are suitable for large inquiry, and then the query result is delivered back to the
businesses. A microservices container-like method, on the client. This technique might be implemented at the network's
other hand, might help to reduce the requirement for updates edge, offering effective and scalable on-demand systems that
and could be practical where digital right management is not execute a unique picture for each URL. Performance-wise,
a crucial limitation, such as when verifying the video game's both the container and the unikernel technologies are viable
code integrity for billing purposes. Moreover, using (i.e., boot time). Unikernel images, however, can give a
unikernels would guarantee a smaller attack surface, assisting relatively restricted attack surface when designed properly
in ensuring code integrity, simplicity of updates, and (i.e., by removing any extraneous functionality), which is
acceptable speed (i.e., reduced latency). further reinforced by the separation among services provided
by the hypervisor. As a result, the inability to completely
Robustness and dependability are very important in terms of remove all unwanted/unnecessary code from images is one of
performance and simplicity of updates for the use-case the key problems with unikernels' security. Automated
scenario of Smart Homes and Cities. As a result, using intelligent technologies for picture production are desperately
unikernel technology can be more and more practical, unless needed to achieve this (see also [36]).
the devices in question are so basic and inexpensive that
hardware virtualization support cannot be ensured. Current Another example is the dynamic nature of virtual networks,
bare metal RTOSes may be the only (or most practical) which implies new security requirements that conventional
choice in this latter scenario. Nevertheless, because it is firewalls cannot address for a variety of reasons. First off,
challenging to maintain such gadgets updated, this method conventional firewalls offer reliable protection on
would be more vulnerable to assaults. This may result in predetermined and static network topologies. However, in a
highly dynamic environment where Virtual Machines (VMs)
are scattered and regularly transferred among various [3] "Fog Orchestration for Internet of Things Services," IEEE
network segments, they lack the flexibility and adaptability Internet Computing, vol. 21, no. 2, pp. 16–24, 2017. Z. Wen,
to provide the same security level. Firewalls might be R. Yang, P. Garraghan, T. Lin, J. Xu, and M. Rovat- sos.
deployed as a software instance to alleviate this issue by
removing the reliance on fixed network topology and [4] S. Biookaghazadeh, M. Zhao, and F. Ren, “Are fpgas
supplying the essential adaptability to safeguard virtual suitable for edge computing?” in {USENIX} Workshop on
networks [38]. The differences between containers and Hot Topics in Edge Computing (HotEdge 18), 2018.
unikernels in this use case are minimal. Nevertheless,
because containerization technology may be set up more [5] The OpenFog Consortium's Tech. Rep. from 2017 is
quickly and easily than unikernels, it may be preferred. As titled "Openfog standard architecture for fog computing."
with the prior use-case, it is uncertain if automated, simpler
delta-based image update procedures would enhance the
usability of the Unikernel [36]. [6] The "Cisco IOx Documentation" docs/iox/#!introduction-
to-iox/what-is-iox at developer.cisco.com.
VII. CONCLUSIONS
[7]. The summary of the Intel Fog reference design is at
First, we looked at how the Edge/Fog paradigm relies on https://www.intel.com/content/dam/www/public/us/en/docum
virtualization technologies to deliver the high performance ents/design-guides/fog-reference-design-overview-guide.pdf.
and scalability that are the cornerstones of its success. We
later investigated potential attacks against the most important
[8] “What is a container?”
virtualization technologies. After that, we contextualised
https://www.docker.com/resources/ what-container, 2018.
these dangers into four distinct Edge/Fog Computing
scenarios. We have highlighted the benefits and downsides of
adopting each virtualization technique that has been taken [9] "Docker ecosystem-vulnerability study," Computer
into consideration for each scenario, as well as the potential Communications, vol. 122, pp. 30-43, 2018. A. Martin, S.
consequences of the identified attacks. We have also Raponi, T. Combe, and R. Di Pietro.
suggested some intriguing future research paths and potential
technical advancements. [10] D. Bernstein, “Containers and cloud: From lxc to docker
to kubernetes,” IEEE Cloud Computing, vol. 1, no. 3, pp. 81–
ACKNOWLEDGEMENT 84, 2014.

Awards NPRP- S-11-0109-180242, UREP23-065-1-014, and


[11] P. Hambarde, R. Varma, and S. Jha, “The Survey of
NPRP X-063-1-014 from the QNRF-Qatar National Research
Real Time Operating System: RTOS,” in International
Fund, a subsidiary of The Qatar Foundation, helped to
Conference on Electronic Systems, Signal Processing and
partially fund the publication. The opinions and facts
Computing Technologies, 2014, pp. 34–39.
included in this article are those of the authors and may not
accurately represent the official QNRF position.
[12] L. Pike, P. Hickey, T. Elliott, E. Mertens, and A. Tomb,
REFERENCES “TrackOS: A Security-Aware Real-Time Operating System,”
in Runtime Verification, 2016, pp. 302–317.
[1] R. Roman, J. Lopez, and M. Mambo, "Mobile Edge
Computing, Fog, and Other Technologies: A Survey and [13] “What is a real-time operating system (rtos)? – white
Analysis of Security Threats and Challenges," Future paper,”
Generation Computer Systems, vol. 78, pp. 680-698, 2018. http://www.ni.com/en-lb/innovations/white-papers/07/ what-
is-a-real-time-operating-system--rtos--.html, 2012.
[2] "Fog computing: Present research and future problems,"
KuVS- Fachgesprach Fog Comput, vol. 1, pp. 1-4, 2018. J. [14] A. Manzalini and N. Crespi, “An edge operating system
Gedeon, J. Heuschkel, L. Wang, and M. Muhlhauser. enabling anything-as-a-service,” IEEE Communications
Mag- azine, vol. 54, no. 3, pp. 62–67, 2016.

You might also like