Book Image

Edge Computing Patterns for Solution Architects

By : Ashok Iyengar, Joseph Pearson
Book Image

Edge Computing Patterns for Solution Architects

By: Ashok Iyengar, Joseph Pearson

Overview of this book

Enriched with insights from a hyperscaler’s perspective, Edge Computing Patterns for Solution Architects will prepare you for seamless collaboration with communication service providers (CSPs) and device manufacturers and help you in making the pivotal choice between cloud-out and edge-in approaches. This book presents industry-specific use cases that shape tailored edge solutions, addressing non-functional requirements to unlock the potential of standard edge components. As you progress, you’ll navigate the archetypes of edge solution architecture from the basics to network edge and end-to-end configurations. You’ll also discover the weight of data and the power of automation for scale and immerse yourself in the edge mantra of low latency and high bandwidth, absorbing invaluable do's and don'ts from real-world experiences. Recommended practices, honed through practical insights, have also been added to guide you in mastering the dynamic realm of edge computing. By the end of this book, you'll have built a comprehensive understanding of edge concepts and terminology and be ready to traverse the evolving edge computing landscape.
Table of Contents (17 chapters)
Free Chapter
1
Part 1:Overview of Edge Computing as a Problem Space
4
Part 2: Solution Architecture Archetypes in Context
8
Part 3: Related Considerations and Concluding Thoughts

Data encryption

In this section, we will discuss the driving factors for encrypting data, emerging techniques for protecting data while increasing its value, and how to have confidence that data has not been unintentionally or surreptitiously modified. You will learn about protecting data during processing without decrypting. By the end of the section, you should be aware of which techniques work well on the edge.

Motivations for encrypting data

Data is encrypted so that unintended parties cannot read and ultimately use the data. Since the data does not belong to those third parties, nor do they have permission to use it, they should not be able to benefit from the usage of that data – also known as the concept of data ownership. It’s about the principle of ownership and the data owner being able to determine to what ends the data and derived value should be put – data sovereignty. Therefore, encryption of data is a method for the data owner to prevent, and...