20240022609. SECURITY AND RESILIENCY FOR CLOUD TO EDGE DEPLOYMENTS simplified abstract (Unknown Organization)
Contents
SECURITY AND RESILIENCY FOR CLOUD TO EDGE DEPLOYMENTS
Organization Name
Inventor(s)
Ned M. Smith of Beaverton OR (US)
Kshitij Arun Doshi of Tempe AZ (US)
Sunil Cheruvu of Tempe AZ (US)
Malini Bhandaru of San Jose CA (US)
Anahit Tarkhanyan of Cupertino CA (US)
Mats Gustav Agerstam of Portland OR (US)
Bruno Vavala of Hillsboro OR (US)
Vidya Ranganathan of Bangalore (IN)
SECURITY AND RESILIENCY FOR CLOUD TO EDGE DEPLOYMENTS - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240022609 titled 'SECURITY AND RESILIENCY FOR CLOUD TO EDGE DEPLOYMENTS
Simplified Explanation
The patent application describes various systems and methods for implementing cloud-to-edge (C2E) security. It specifically focuses on managing distributed workloads that are distributed among multiple edge computing nodes. The application proposes a technique for identifying characteristics of a distributed workload, evaluating the trust status of the workload, and controlling its execution among the computing nodes based on the characteristics and trust status.
- The technique involves identifying characteristics of a distributed workload that is partitioned among multiple computing nodes.
- It evaluates the trust status of the distributed workload in response to changes in its execution.
- The evaluation includes verifying the availability of resources to execute the workload and verifying the associated security policies.
- Based on the characteristics and evaluated trust status, the technique controls the execution of the distributed workload among the multiple computing nodes.
Potential Applications:
- Cloud-to-edge (C2E) security implementation
- Management of distributed workloads in edge computing environments
Problems Solved:
- Ensuring secure execution of distributed workloads in edge computing nodes
- Managing and controlling the distribution of workloads among multiple computing nodes
Benefits:
- Improved security and trustworthiness of distributed workloads
- Efficient management and control of distributed workloads in edge computing environments
Original Abstract Submitted
various systems and methods are described for implementing cloud-to-edge (c2e) security are disclosed, including systems and methods for the execution of various workloads that are distributed among multiple edge computing nodes. an example technique for managing distributed workloads includes: identifying characteristics of a distributed workload from an execution of the distributed workload, for a distributed workload that is partitioned among multiple computing nodes; evaluating a trust status of the distributed workload in response to a change in the execution of the distributed workload, including verifying resources to execute the distributed workload and verifying security policies associated with the resources; and controlling the execution of the distributed workload among the multiple computing nodes, based on the characteristics and the evaluated trust status.
- Unknown Organization
- Ned M. Smith of Beaverton OR (US)
- Kshitij Arun Doshi of Tempe AZ (US)
- Sunil Cheruvu of Tempe AZ (US)
- Malini Bhandaru of San Jose CA (US)
- Anahit Tarkhanyan of Cupertino CA (US)
- Mats Gustav Agerstam of Portland OR (US)
- Bruno Vavala of Hillsboro OR (US)
- Vidya Ranganathan of Bangalore (IN)
- H04L9/40
- G06F9/50