Edge Computing Security Application: Kilic

Guven E. Y. , Camurcu A. Y.

3rd International Conference on Computer Science and Engineering (UBMK), Sarajevo, Bosnia And Herzegovina, 20 - 23 September 2018, pp.248-253 identifier identifier

  • Publication Type: Conference Paper / Full Text
  • Volume:
  • Doi Number: 10.1109/ubmk.2018.8566521
  • City: Sarajevo
  • Country: Bosnia And Herzegovina
  • Page Numbers: pp.248-253


Intelligent systems change familiar objects as well as rapidly change common technologies. Internet of Things (IoT) applications are made with Cloud Computing can not meet the expectation of service quality due to bandwidth and network delays. It focuses on solving these needs in real-time intelligent applications that use Edge Computing, which is introduced as a new platform between the cloud and the objects. Security and privacy concerns are a major obstacle to the widespread use of intelligent objects. Edge Computing has both its proximity to objects and sufficient resources are available to provide an environment for the operation of security applications. In this study, Edge Computing is introduced. Edge Computing Security Aplicatiun Kills is recommend, which works on the Edge Layer. To illustrate the effective use of the MIK, the real-time industry application has been shown in the context of the Smart Factory.