Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review
نویسندگان
چکیده
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to provide computation, storage, and networking capabilities at the edge network in close proximity end-users. The MEC architecture supports applications services bridge between includes devices systems are interconnected, layered, flexibly deployed. As a result technological advancements, facing myriad highly sophisticated threats. This paper provides review Architecture, use cases, conceptual guidelines for security architecture, privacy techniques, identifies current future challenges, their implications, approaches overcome challenges. research examined significant threats, described identified susceptible functional layers, different categories potential safeguards. recommends providers should implement multiple layers controls mitigate targeted attacks.
منابع مشابه
Review Article Data Security and Privacy in Cloud Computing
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user’s concerns about the cloud technology. Though many techniques on the topics in cloud computing have been invest...
متن کاملData Security in Multi Cloud Computing : A Brief Review
cloud computing is an innovative framework for developing, deploying new things. The primary use of cloud is for storage. Traditionally users used to save their data in a hard disk. But they need to carry the hard disk with them all around. The capacity of hard disk failed to match against the tremendous growth of their data. This is the main reason why users decided to use cloud as their prima...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملAccess Control for Security and Privacy in Ubiquitous Computing Environments
Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous comput...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3053233