Survey on Multi-Access Edge Computing Security and Privacy

نویسندگان

چکیده

The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security privacy are significant factors realization MEC deployments. In this paper, we analyse system. We introduce a thorough investigation identification analysis threat vectors ETSI standardized architecture. Furthermore, vulnerabilities leading identified propose potential solutions overcome these vulnerabilities. issues also highlighted, clear objectives for preserving defined. Finally, present future directives enhance services.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access Control for Security and Privacy in Ubiquitous Computing Environments

Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous comput...

متن کامل

Security and Privacy Issues of Fog Computing: A Survey

Fog computing is a promising computing paradigm that extends cloud computing to the edge of networks. Similar to cloud computing but with distinct characteristics, fog computing faces new security and privacy challenges besides those inherited from cloud computing. In this paper, we have surveyed these challenges and corresponding solutions in a brief manner.

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

Reliable Distributed Authentication in Multi-Access Mobile Edge Computing

The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...

متن کامل

Survey on Security Schemes for Biometric Privacy

Biometric is the science of establishing the identity of on individual based on physical or behavioral traits such as face, fingerprint, Iris. The increasing popularity of biometrics offers personal identification systems greater security and convenient than password authentication system. A biometric system operates by acquiring raw biometric data from a subject, extracting a feature set from ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Communications Surveys and Tutorials

سال: 2021

ISSN: ['2373-745X', '1553-877X']

DOI: https://doi.org/10.1109/comst.2021.3062546