Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review

نویسندگان

چکیده

Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to provide computation, storage, and networking capabilities at the edge network in close proximity end-users. The MEC architecture supports applications services bridge between includes devices systems are interconnected, layered, flexibly deployed. As a result technological advancements, facing myriad highly sophisticated threats. This paper provides review Architecture, use cases, conceptual guidelines for security architecture, privacy techniques, identifies current future challenges, their implications, approaches overcome challenges. research examined significant threats, described identified susceptible functional layers, different categories potential safeguards. recommends providers should implement multiple layers controls mitigate targeted attacks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review Article Data Security and Privacy in Cloud Computing

Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user’s concerns about the cloud technology. Though many techniques on the topics in cloud computing have been invest...

متن کامل

Data Security in Multi Cloud Computing : A Brief Review

cloud computing is an innovative framework for developing, deploying new things. The primary use of cloud is for storage. Traditionally users used to save their data in a hard disk. But they need to carry the hard disk with them all around. The capacity of hard disk failed to match against the tremendous growth of their data. This is the main reason why users decided to use cloud as their prima...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Access Control for Security and Privacy in Ubiquitous Computing Environments

Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous comput...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3053233