Design and Implementation of Secure Edge-to-Cloud Architectures Using AWS and Infrastructure as Code
DOI:
https://doi.org/10.63282/3050-9416.ICAIDSCT26-102Keywords:
Edge-To-Cloud Security, Aws Architecture, Infrastructure As Code, Cloud Security, Edge Computing, Zero Trust, DevsecopsAbstract
Digital systems are currently very popular for combining edge and cloud computing. It makes it possible to see data at the edge fast, and it also uses the scalability and analytical power of centralized cloud systems. Some of the things this technology can be used for are smart infrastructure, industrial IoT, and real-time analytics. In these situations, data must be securely linked to cloud services and processed near its source. Edge-cloud settings are far more likely to be hacked than typical perimeter-based safeguards because they are not centralized. Edge-to-cloud systems are more susceptible to be hacked because they have various hardware and software architectures, inconsistent configuration management, and don't know everything about all the elements that are spread out. You could have problems like configuration drift, misconfigurations, and trouble enforcing policies if you construct your own infrastructure and apply security techniques that weren't designed to be used. The issues mentioned above make it tougher to keep security across different edge and cloud installations at the same level. This study shows how crucial Infrastructure as Code (IaC) is for making sure that edge-to-cloud systems are set up correctly and consistently, and for keeping track of what happens. With Infrastructure as Code (IaC), you may develop code that works with different versions of security, infrastructure, and policy. This makes it easier to obey the rules, makes sure that all configurations are the same, and sets up environments on their own. This article speaks about a secure edge-to-cloud architecture for AWS that incorporates Infrastructure as Code, identity and access management, network segmentation, encryption, and 24/7 monitoring. From the very beginning of the design process, safety was the most important thing. It uses AWS services to set up least-privilege access, protect data while it is being sent and stored, and find misconfigurations early in the deployment phase. The main findings show that Infrastructure as Code (IaC) architectures greatly lower security risks, make deployments more consistent, and give operators better insight into how things are running. The essay is a good example of how to use AWS to build secure, scalable edge-to-cloud systems, and it also gives useful tips on how to do it.
References
1. Masouros, Dimosthenis, et al. "From edge to cloud: Design and implementation of a healthcare Internet of Things infrastructure." 2017 27th international symposium on power and timing modeling, optimization and simulation (PATMOS). IEEE, 2017.
2. Borra, Praveen, and Harshavardhan Nerella. "Analyzing AWS Edge Computing Solutions to Enhance IoT Deployments." Available at SSRN 5152092 (2024).
3. Bialas, Karol, et al. "Enhancing Cloud Marketplace Operations with Infrastructure as Code: DOME-A Case Study." 2024 IEEE Globecom Workshops (GC Wkshps). IEEE, 2024.
4. Akello, Patricia, Nicole Lang Beebe, and Kim-Kwang Raymond Choo. "A literature survey of security issues in cloud, fog, and edge IT infrastructure." Electronic Commerce Research 25.2 (2025): 705-739.
5. Patil, Sandeep Parshuram. "Developing Intelligent Edge Solutions Using AWS Greengrass and Azure IoT." Journal of Mathematical & Computer Applications 3.1 (2024): 1-5.
6. Awaysheh, Feras M. "From the cloud to the edge towards a distributed and light weight secure big data pipelines for iot applications." Trust, security and privacy for big data. CRC Press, 2022. 50-68.
7. Kartha, Gokul Sivasankaran. "OpenVehicle2Cloud (OpenV2C): A Lightweight Secure MQTT-Based Vehicle-to-Cloud Communication Standard." Authorea Preprints (2025).
8. Serra, Gabriele, Pietro Fara, and Daniel Casini. "Enhancing the Availability of Web Services in the IoT-to-Edge-to-Cloud Compute Continuum: A WordPress Case Study." 2023 26th Euromicro Conference on Digital System Design (DSD). IEEE, 2023.
9. Javed, Asad, et al. "IoTEF: A federated edge-cloud architecture for fault-tolerant IoT applications." Journal of Grid Computing 18.1 (2020): 57-80.
10. Carranza, Harrison, et al. "Cloud Computing: Exploring the Digital Frontier for the Academic Environment." 2024 International Symposium on Accreditation of Engineering and Computing Education (ICACIT). IEEE, 2024.
11. McCarthy, Dave. "AWS at the edge: A cloud without boundaries." International Data Corporation Accessed via https://d1. awsstatic. com/IoT/IDC-AWS-at-the-Edge-White-Paper. pdf 1.1 (2020): 1-13.
12. Pandugula, Chandrashekar. "Artificial Intelligence and Infrastructure-as-Code: Revolutionizing Cloud Computing Security for Retail Operations." American Advanced Journal for Emerging Disciplinaries (AAJED) ISSN: 3067-4190 2.1 (2024).
13. Ramachandran, Ashwin. Design of an Edge to Cloud IIoT Middleware Architecture. North Carolina State University, 2022.
14. Caballer, Miguel, et al. "Infrastructure manager: a TOSCA-based orchestrator for the computing continuum." Journal of Grid Computing 21.3 (2023): 51.
15. Gigli, Lorenzo, et al. "Next generation edge-cloud continuum architecture for structural health monitoring." IEEE Transactions on Industrial Informatics 20.4 (2023): 5874-5887.