Survey on Multi-Access Edge Computing Security and Privacy
نویسندگان
چکیده
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security privacy are significant factors realization MEC deployments. In this paper, we analyse system. We introduce a thorough investigation identification analysis threat vectors ETSI standardized architecture. Furthermore, vulnerabilities leading identified propose potential solutions overcome these vulnerabilities. issues also highlighted, clear objectives for preserving defined. Finally, present future directives enhance services.
منابع مشابه
Access Control for Security and Privacy in Ubiquitous Computing Environments
Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous comput...
متن کاملSecurity and Privacy Issues of Fog Computing: A Survey
Fog computing is a promising computing paradigm that extends cloud computing to the edge of networks. Similar to cloud computing but with distinct characteristics, fog computing faces new security and privacy challenges besides those inherited from cloud computing. In this paper, we have surveyed these challenges and corresponding solutions in a brief manner.
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملReliable Distributed Authentication in Multi-Access Mobile Edge Computing
The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...
متن کاملSurvey on Security Schemes for Biometric Privacy
Biometric is the science of establishing the identity of on individual based on physical or behavioral traits such as face, fingerprint, Iris. The increasing popularity of biometrics offers personal identification systems greater security and convenient than password authentication system. A biometric system operates by acquiring raw biometric data from a subject, extracting a feature set from ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Communications Surveys and Tutorials
سال: 2021
ISSN: ['2373-745X', '1553-877X']
DOI: https://doi.org/10.1109/comst.2021.3062546