By controlling data closer to its source and therefore deciding which data needs to be sent to the cloud, the cybersecurity risks of theft or improper access to information are much lower with Edge Computing.
Edge computing adoption has witnessed a significant amount of growth in recent years. A recent report by Research and Marketsrl ecords that the global edge computing market size is anticipated to reach $155.90 billion by 2030.
The industrial sector is immersed in profound changes that are changing its usual dynamics. By digitizing equipment and processes, they are seeking to optimize time and costs and implement new business models that provide them with more value. Implementing these digitization processes involves collecting a large volume of data, analyzing it and understanding what decisions need to be made and what actions need to be taken.
The IT industry has been using the Cloud Computing model for years, a centralised model of data analysis, in large processing centres that are located in servers with great computing power but far away from the source of the data.
This model, however, poses a number of problems and arouses some misgivings in the industrial world. A new computing model is therefore emerging strongly in the industry: Edge Computing. This model consists of complementing cloud processing with data processing at the edge of the network, i.e at nodes much closer to where the data is captured.
Barbara IoT has recently conducted a study analysing the level of knowledge, needs and use cases around Edge Computing in industrial companies that we invite you to download if you want to know more details about the implementation of this technology in industry.
Edge computing is in full expansion: while in 2019 Grand View Research estimated the value of the edge computing market at $3.5 billion, IDC is already predicting that by 2022 the value of the edge computing market will rise to $40 billion, rising to $64 billion by 2025.
And one of the big reasons for this trend is that it brings 3 major advantages for the industrial sector compared to centralising computing in a single point (the cloud):
1. Scalability: by distributing the storage and processing of data across many locations, the growth of investment in infrastructure and capacity for higher traffic volumes or better algorithms is much more controlled.
2. Increased data security and sovereignty: by controlling data from its source location and therefore deciding what and when to send to the cloud, cybersecurity risks due to theft or improper access to information are reduced.
3. Greater efficiency: data analysis frequencies from the edge allow working with thousands of data almost instantaneously, and analysis and response times are in the order of milliseconds. This allows for almost real-time use cases, unthinkable in cloud environments more oriented towards offline analysis of batches of information.
Another technology trend that analysts see gaining momentum in 2022 is aimed at developing use cases in the field of industrial digitisation through the data that can be collected at the edge. This is Artificial Intelligence (AI) applied at the edge, known as "Edge AI" .
Edge AI is a technology that consists of using Machine Learning algorithms to process data generated by devices (IoT sensors, industrial equipment, etc.) at a local level. This processing is carried out in Edge Nodes that are located and connected locally to the data sources themselves. Part of what has driven the growth of edge computing adoption in industries is actually, artificial intelligence.
Edge AI benefits from the advantages of Edge Computing and also provides a much more advanced computing model for data. With this technology, actions and decisions can be automated based on the data itself, further increasing the efficiency and effectiveness of industrial digitisation.
An example of the use of Edge AI technology in the industrial world, is the Predictive Maintenance. Thanks to the information obtained by sensors, industrial equipment and other IoT devices and through algorithms that analyse the data, look for patterns of behaviour and draw conclusions, it is possible to find out the probability of failure of a machine or element in, for example, a production line and thus decide when it is best to make a controlled stop to carry out maintenance work.
Edge computing minimizes vulnerabilities linked to the transfer of data to the cloud (unlike cloud computing). The fact that the data is controlled from a local element, the edge node, significantly reduces this risk. However, this computing model also faces a number of cybersecurity risks that are important to be aware of when deploying on the Edge.
"Being a network architecture that relies on distributed, even unattended resources, connected in many cases to critical elements, its security, protection and monitoring design requires special attention. This is of much greater relevance when Edge Nodes can operate the very industrial equipment to which they are connected."
Good cyber-security practices applied to the Edge therefore mainly involve: 1) To ensure the protection of the edge nodes 2) to mplement a DevSecOps development strategy.
In addition, it would also be good to incorporate into the edge computing model some protection mechanisms that are already developed in cloud computing models: system integrity, information availability and secure data search.
Edge nodes are responsible for both isolating industrial equipment from potential attacks from the network and protecting the data that industrial equipment captures and sends to the edge nodes themselves.
To this end, the edge nodes to be deployed must have protection mechanisms in place for this purpose, and they must also be remotely upgradeable.
Another good practice is to develop logic on the edge nodes that allows them to update not only themselves but also the industrial equipment to which they are connected.
The DevOps methodology promulgates that development and systems teams, processes and tools should not be separated. The entire lifecycle of an application, from design to production deployment and maintenance, should be conceived as an integrated whole. In this way, it is the same engineers who code both the application and the tools to test and deploy it in an automated way in different environments.
The DevSecOps methodology consists of introducing cybersecurity into the above dynamics, so that it becomes part of the lifecycle of an application.
This methodology, applied to the development of Edge applications, helps to prevent cybersecurity risks that threaten Edge nodes and the equipment to which they connect.
Barbara is the Cybersecure Industrial Edge Platform designed to govern distributed intelligence. It has been built with cybersecurity at its core is equipped with a set of functionalities that guarantee the privacy and resilience of the system.
In doing so, we have also followed key recommendations from organisations such as the GSMA, OWASP or the Industrial Internet Consortium (IIC) and industry standards such as IEC-62443.
Technologies that ensure the cybersecurity of the Barbara platform include:
If you want to know more about the Barbara platform, you can download our product sheet.