2021; Dulana Rupanetti, et al., 2024, Software
Defined Networks (SDN) is a novel technology
concept for networking that arose from recent
advancements in computer networking. The SDN
controller is a centralized piece of software that
controls the way the network operates as a whole.
With SDN, there is a natural consolidation of network
intelligence and a decoupling of the control and data
planes.
In response to packets or proactively via rules, the
controller has the capacity to add, edit, or remove
flow entries. Also, SDN allows for dynamic policy
enactment, fine-grained traffic filtering, and rapid
response to security events. An SDN architecture-
based Internet of Things security paradigm is present.
In summary, the reported research was successful
towards delivery of the first goal of the proposed
security model, which is to design and secure a
wireless and wired network infrastructure. M. Yasir
Mehmood, et al., 2021, The next step would be to
expand the proposed model to include Ad-Hoc
networks and network object, like sensors, tablets,
smartphones, etc. An inventive method to cloud
manufacturing has taken shape, incorporating the
tenets of “Internet of everything, intelligent leading,
digital/analog driving, shared services, cross-border
integration and universal innovation.” This
methodology also changes how services are provided
in cloud and IoT environments, developing a wider
range of possibilities. With the introduction of new
sensing units, perception technologies, and internet of
things (IoT) infrastructure, intelligent manufacturing
resources, capabilities, and products are being linked
to new networks. Odugu Rama Devi, et al., 2022;
Bhagwati Sharan, et al., 2022; Akhil Pandey, et al.,
2023, These networks include private networks,
sensor networks, software-defined networks, global
positioning systems (GPS), remote sensing, radar,
and quick response (QR) codes. As a result, the
network perimeter of the new cloud manufacturing
system is become more and more open and diffuse.
Existing security architectures rely on information
security technologies to safeguard modern cloud
manufacturing systems, and they are not adequate.
2 RELATED WORKS
Edge computing and security problems in cloud
networks are very widespread now. Sina Ahmadi,
2024 This study concentrates on investigating such
problems and formulating the ideal answers. In this
sense, a thorough literature review has been done.
According to the results, edge computing is connected
to various difficulties like privacy issues, security
breaches, expensive expenses, low efficiency, etc.
Thus, appropriate security policies must be put in
place if we are to solve these problems. Emerging
developments such machine learning, encryption,
artificial intelligence, real-time monitoring, etc. assist
to reduce security concerns by means of technology.
Moreover, via cloud computing they may create a safe
and secure future. It was found that new technologies
and approaches readily allow one to cover the security
consequences of edge computing.
The fast-growing Internet of Things environment
makes solutions for effective data processing and
analysis much sought after. The topic of this paper
is the possible Internet of Things (IoT) usage of hybrid
architectures, cloud computing, and edge computing.
Using extensive search and analysis of industry
publications, conference proceedings, and peer-
reviewed articles, the technique highlighted current
advancements in computing technology for the
Internet of Things (IoT). Although cloud computing
offers more scalability and flexibility, the results
reveal that edge computing excels in reducing latency
and enhancing data privacy by localized processing.
Fog and mist computing is two hybrid systems
aggregating the best aspects of cloud and edge
computing. For Internet of Things (IoT)
deployments, these hybrid systems enhance
bandwidth consumption and provide low-latency,
privacy-sensitive applications. For situations needing
low-latency processing and excellent bandwidth
control, hybrid architectures are found very
successful. These methods satisfy the limitations of
both edge and cloud computing for IoT as they offer a
balanced method of data analysis and resource
management. They also exhibit a tremendous
progressive progress.
Shalin Parikh, et al., 2019, New computing
paradigm known as cloud computing entered the
scene with the arrival of IoT/5G and the data
warehousing and processing now mostly use cloud
computing as their platform. Data storage into the
cloud does, however, provide a unique set of security
issues and problems. Moreover, as every device
creates more data; the traditional cloud computing
paradigm cannot manage problems like excessive
latency, bandwidth limitation, and resource
restriction. New computational paradigms such as
edge and fog computing are being proposed to solve
the issues of the former at the device itself or close by.
Both of these approaches offer compute decisions and
memory storage very adjacent to the device. No
system is flawless notwithstanding their benefits.