International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-6  ( Jun, 2024 )
Past issues
  1. Volume-12,Issue-5  ( May, 2024 )
  2. Volume-12,Issue-4  ( Apr, 2024 )
  3. Volume-12,Issue-3  ( Mar, 2024 )
  4. Volume-12,Issue-2  ( Feb, 2024 )
  5. Volume-12,Issue-1  ( Jan, 2024 )
  6. Volume-11,Issue-12  ( Dec, 2023 )
  7. Volume-11,Issue-11  ( Nov, 2023 )
  8. Volume-11,Issue-10  ( Oct, 2023 )
  9. Volume-11,Issue-9  ( Sep, 2023 )
  10. Volume-11,Issue-8  ( Aug, 2023 )

Statistics report
Oct. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 138
Paper Published : 1629
No. of Authors : 4297
  Journal Paper


Paper Title :
Data Sanitization and Privacy Preservation Method on Edge Nodes

Author :Lisa Biswas, Rashmi Agarwal, Vinay By

Article Citation :Lisa Biswas ,Rashmi Agarwal ,Vinay By , (2022 ) " Data Sanitization and Privacy Preservation Method on Edge Nodes " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 44-47, Volume-10,Issue-10

Abstract : Abstract - With more edge devices becoming internet-connected, the demand for real-time, no-delay data processing on edge nodes has increased, as it allows systems to process data effectively while consuming less internet bandwidth, and a lot of data can be processed at or near the source. Edge computing is a distributed open architecture that enables systems to process data closer to the information source instead of sending it to the cloud. Edge is defined as the communication that unites the physical and digital worlds. Security risks occur when data is sent to the cloud through IoT devices. Every change the data undergoes might lead to a security lapse. Information transmission across borders is being restricted by tightening privacy restrictions. Edge computing, which stores and analyzes data at the point of origin, is a valuable method for avoiding security problems. A strict governance plan might inhibit innovation, while inadequate or insufficient data governance could expose the company to market disruptions. By minimizing data disruption and analyzing data to improve privacy, decrease data breaches, and promote usability using edge computing for data management. An organization's primary goal is to safeguard the personal information of users, clients, and workers. Data masking has become essential for many firms to protect sensitive information. Companies must have policies for identifying sensitive data, selecting appropriate data masking techniques, and conducting frequent data assurance audits. Keywords - Edge Computing, IoT, Data integrity, Edge Nodes, PII.

Type : Research paper

Published : Volume-10,Issue-10


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-19125   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 49
| Published on 2022-12-27
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY