IIC Journal of Innovation 17th Edition Applying Solutions at the Digital Edge | Page 12

Key Criteria to Move Cloud Workloads to the Edge
operations , for example ). Finally , adversaries would find this data very valuable , and care must be taken to prevent its unintended interception by them , either as data in motion or data at rest .
Edge computing can help match the processing and storage location used by a piece of data to its data gravity preferences . In our wearable for the warfighter example , an edge node in a backpack , or on a Humvee , or in an aircraft cockpit , or at a forward fire base can accept data from all the wearables used by all the warfighters in the area , process it to filter and apply AI algorithms , and store it locally . Then , interesting subsets of the data that was stored and processed in the edge node can be responded to instantly , and appropriately condensed , aggregated , anonymized , and encrypted for safe , efficient transmission to higher layers of edge nodes or the cloud as needed .
Trustworthiness
The Industrial Internet Consortium defines trustworthiness of IoT networks as the conjunction of five properties : safety , security , reliability , resilience , and privacy ( this topic was treated extensively in the September 2018 edition of this publication 10 ). As we will see , relying exclusively on cloud data centers to store and process critical data can present challenges in all five of these aspects of trustworthiness , and moving at least a portion of the workloads to edge computing can improve the situation . Figure 3 is a graphical depiction of the five overlapping aspects of trustworthiness .
10
Journal of Innovation - September 2018 | Industrial Internet Consortium ( iiconsortium . org )
- 8 - June 2021