IIC Journal of Innovation 17th Edition Applying Solutions at the Digital Edge | Page 13

IIC Trustworthiness Model
Key Criteria to Move Cloud Workloads to the Edge
IIC Trustworthiness Model
• Trustworthiness is a combina�on of these five elements :
1 .
Safety
2 .
Security
3 .
Resilience
4 .
Reliability
5 .
Privacy
Reliability
• ( Not only security and privacy ).
• These must be reconciled .
3
Fig . 3 - Industrial Internet Consortium Trustworthiness Model
Safety critical systems often experience challenges with cloud-based processing . Cloud data centers are occasionally down , unreachable , or unacceptably slow due to outages , network problems , hacker attacks , overloads , or disasters . If an application is being depended upon to keep people safe ( for example , anti-collision systems in autonomous vehicles , elevator controls , or worker safety monitors in smart manufacturing ), relying exclusively on cloud-based processing will be unacceptably risky . By moving the most safety critical aspects of these applications to edge computing nodes located physically close to where the data is being generated and used and maintaining careful control over the configuration and load of those edge nodes , the network can be relied upon to perform adequately to keep people safe .
Security is an overarching concern in IoT systems . There are many aspects to network security that have been discussed extensively in many publications , including IIC ’ s Industrial Internet Security Framework Technical Document 11 . Critical IoT applications run exclusively in cloud data centers have certain security vulnerabilities that are often difficult to eliminate . These include unauthorized interception of data ( either in motion or at rest ), authorization / authentication failures , compromises to cryptographic systems , unauthorized changes to system configurations or policies , overwriting data , hacking software , etc . Because of its public , shared , and remote nature , there are many vectors for these security threats to enter the cloud and compromise the
11
Industrial Internet Security Framework | Industrial Internet Consortium ( iiconsortium . org )
IIC Journal of Innovation - 9 -