This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.
Adarsh Kumar Mishra,
Shubham Kamlesh Mishra,
- Student, Department of MCA, Thakur Institute of Management Studies, Career Development & Research (TIMSCDR) Mumbai, Maharashtra, India
- Professor, Department of MCA, Thakur Institute of Management Studies, Career Development & Research (TIMSCDR) Mumbai, Maharashtra, India
Abstract
Cloud–edge hybrid systems have become a key framework in today’s distributed computing landscape, combining fast, near-source data processing at the edge with the flexible scalability and resource richness of centralized cloud infrastructures. However, this in- tegration introduces a complex security landscape where tradi- tional perimeter- based cloud security measures are insufficient for resource- constrained and physically exposed edge nodes. This literature review synthesizes findings from established research publications (2020–2025), focusing on threat models, vulnerabilities, and mitigation mechanisms across cloud–edge environments. Specifically, we analyze the shift toward Zero Trust Architectures (ZTA) and Lightweight Cryptography as essential defense mechanisms. The review identifies critical gaps in unified security frameworks, secure data offloading, and cross-layer trust establishment. Our analysis, supported by recent attack statistics, concludes that future work must prioritize AI-driven threat detection and standardized hybrid security protocols.
Keywords: Cloud-Edge Computing, Zero Trust Architec- ture, Lightweight Cryptography, Network Security, Hybrid Cloud, AI Threat Detection
Adarsh Kumar Mishra, Shubham Kamlesh Mishra. A Systematic Literature Review on Security Challenges in Cloud–Edge Hybrid Systems. International Journal of Wireless Security and Networks. 2026; 04(01):-.
Adarsh Kumar Mishra, Shubham Kamlesh Mishra. A Systematic Literature Review on Security Challenges in Cloud–Edge Hybrid Systems. International Journal of Wireless Security and Networks. 2026; 04(01):-. Available from: https://journals.stmjournals.com/ijwsn/article=2026/view=241110
References
- M. Satyanarayanan, “The emergence of edge computing,” IEEE Computer, vol. 50, no. 1, pp. 30–39, Jan 2017.
- Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu, and W. Lv, “Edge computing security: State of the art and challenges,” Proceedings of the IEEE, vol. 107, no. 8, pp. 1608–1631, Aug 2019.
- Check Point Research, “2024 cyber security report,” Check Point Software Technologies, Tel Aviv, Israel, Tech. Rep., 2024.
- IBM Security, “Cost of a data breach report 2024,” IBM Corporation, Armonk, NY, USA, Tech. Rep., 2024.
- G. Nzeako and R. Shittu, “Implementing zero trust security models in cloud computing environments,” World Journal of Advanced Research and Reviews, vol. 24, no. 3, pp. 1647–1660, 2024.
- S. Shackelford, “Zero-trust security: Assume that everyone and everything on the internet is out to get you,” The Conversation, vol. 10, Jul 2024.
- J. Adelusi and B. Henry, “Lightweight encryption techniques for edge devices,” ResearchGate Preprints, Jan 2025.
- M. e. a. Al-Sarem, “Lightweight cryptographic framework for securing iot devices in edge environments,” Journal of Information Systems Engineering & Management, vol. 9, no. 4s, pp. 199–208, Dec 2024.
- A. Sharma, “Zero trust architectures empowered by ai: A paradigm shift in cloud and edge cybersecurity,” ResearchGate, Sep 2025.
- K. Muthalagu, “Adversarial threats to ai-driven systems: Exploring the attack surface of machine learning models and countermeasures,” ResearchGate, Feb 2025.
- M. Pujari and A. Pakina, “Adversarial attacks on edge ai: Security risks and mitigation strategies,” in IOSR Journal of Computer Engi-neering, vol. 26, May 2025, pp. 63–71.

International Journal of Wireless Security and Networks
| Volume | 04 |
| 01 | |
| Received | 26/12/2025 |
| Accepted | 05/02/2026 |
| Published | 27/04/2026 |
| Publication Time | 122 Days |
Login
PlumX Metrics