Survey on Multi-Access Edge Computing Security and Privacy

被引:175
|
作者
Ranaweera, Pasika [1 ]
Jurcut, Anca Delia [1 ]
Liyanage, Madhusanka [1 ,2 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci, Dublin D04 V1W8 4, Ireland
[2] Univ Oulu, Ctr Wireless Commun, Oulu 90570, Finland
来源
基金
芬兰科学院;
关键词
Security; Privacy; Cloud computing; 5G mobile communication; Servers; Real-time systems; Outsourcing; Multi-access edge computing (MEC); security; privacy; Internet of Things (IoT); 5G; cloud computing; future networks; OF-THE-ART; SERVICE MIGRATION; NETWORK; 5G; EFFICIENT; FOG; IOT; CHALLENGES; CLOUD; OPPORTUNITIES;
D O I
10.1109/COMST.2021.3062546
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MEC deployments. In this paper, we analyse the security and privacy of the MEC system. We introduce a thorough investigation of the identification and the analysis of threat vectors in the ETSI standardized MEC architecture. Furthermore, we analyse the vulnerabilities leading to the identified threat vectors and propose potential security solutions to overcome these vulnerabilities. The privacy issues of MEC are also highlighted, and clear objectives for preserving privacy are defined. Finally, we present future directives to enhance the security and privacy of MEC services.
引用
收藏
页码:1078 / 1124
页数:47
相关论文
共 50 条
  • [31] Multi-access Edge Computing fundamentals, services, enablers and challenges: A complete survey
    Liang, Bin
    Gregory, Mark A.
    Li, Shuo
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 199
  • [32] Intelligent Immunity Based Security Defense System for Multi-Access Edge Computing Network
    Zhou, Chengcheng
    Yu, Yanping
    Yang, Shengsong
    Xu, Haitao
    CHINA COMMUNICATIONS, 2021, 18 (01) : 100 - 107
  • [33] Intelligent Immunity Based Security Defense System for Multi-Access Edge Computing Network
    Chengcheng Zhou
    Yanping Yu
    Shengsong Yang
    Haitao Xu
    中国通信, 2021, 18 (01) : 100 - 107
  • [34] SDNFV Based Threat Monitoring and Security Framework for Multi-Access Edge Computing Infrastructure
    Prabhakar Krishnan
    Subhasri Duttagupta
    Krishnashree Achuthan
    Mobile Networks and Applications, 2019, 24 : 1896 - 1923
  • [35] SDNFV Based Threat Monitoring and Security Framework for Multi-Access Edge Computing Infrastructure
    Krishnan, Prabhakar
    Duttagupta, Subhasri
    Achuthan, Krishnashree
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (06): : 1896 - 1923
  • [36] Latency Aware Placement in Multi-access Edge Computing
    Harris, Dor
    Naor, Joseph
    Raz, Danny
    2018 4TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION AND WORKSHOPS (NETSOFT), 2018, : 132 - 140
  • [37] Collaborative Computation Offloading for Multi-access Edge Computing
    Yu, Shuai
    Langar, Rami
    2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019, : 689 - 694
  • [38] Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions
    Mahbub, Mobasshir
    Shubair, Raed M.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 219
  • [39] Digital twins and multi-access edge computing for IIoT
    Andreas P.PLAGERAS
    Konstantinos E.PSANNIS
    虚拟现实与智能硬件(中英文), 2022, 4 (06) : 521 - 534
  • [40] Dynamic UAV Routing for Multi-Access Edge Computing
    Elghitani, Fadi
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (06) : 8878 - 8888