Building Trust in Edge Computing: Best Practices and Key Considerations