Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review

被引:84
作者
Ali, Belal [1 ]
Gregory, Mark A. [1 ]
Li, Shuo [1 ]
机构
[1] RMIT Univ, Sch Engn, Melbourne, Vic 3000, Australia
关键词
Security; Computer architecture; Data security; Cloud computing; Servers; Data privacy; Edge computing; Multi-access edge computing; MEC; security; privacy; SDN; 5G; AUTHENTICATION SCHEME; ACCESS-CONTROL; GAME-THEORY; INTERNET; EFFICIENT; ALGORITHM; NETWORKS; PROTOCOL; MODEL; FOG;
D O I
10.1109/ACCESS.2021.3053233
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to provide computation, storage, and networking capabilities at the edge of the network in close proximity to end-users. The MEC architecture supports applications and services that bridge between cloud computing and end-users. The architecture includes devices and systems that are interconnected, layered, and flexibly deployed. As a result of the technological advancements, MEC is facing a myriad of highly sophisticated threats. This paper provides a review of MEC Architecture, use cases, conceptual guidelines for MEC security architecture, security and privacy techniques, and identifies current and future challenges, their implications, and approaches to overcome the challenges. This research examined significant threats, described the MEC architecture, identified the susceptible functional layers, the different categories of threats, and the potential security safeguards. The research recommends that MEC providers should implement multiple layers of security controls to mitigate targeted attacks.
引用
收藏
页码:18706 / 18721
页数:16
相关论文
共 106 条
[1]   A model for attribute-based user-role assignment [J].
Al-Kahtani, MA ;
Sandhu, R .
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :353-362
[2]  
[Anonymous], 2019, SECURITY REQUIREMENT
[3]  
[Anonymous], 2003, ITU-T: X.805
[4]  
[Anonymous], 2017, 5G PPP ARCHITECTURE WORKING GROUP
[5]  
[Anonymous], 2009, Security in Telecommunications and Information Technology: An overview of Issues and the Deployment of Existing ITU-T Recommendations for Secure Telecommunications
[6]  
[Anonymous], 2020, Security Considerations for Quantum Key Distribution Network
[7]  
[Anonymous], 2020, COMPL COH PLATF APPR
[8]  
Atlam Hany F., 2018, International Journal of Computer Network and Information Security, V10, P26, DOI 10.5815/ijcnis.2018.01.04
[9]   CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing [J].
Banerjee, Amit ;
Hasan, Mahamudul ;
Rahman, Md. Auhidur ;
Chapagain, Rajesh .
IEEE ACCESS, 2017, 5 :17678-17691
[10]   Technology pillars in the architecture of future 5G mobile networks: NFV, MEC and SDN [J].
Blanco, Bego ;
Oscar Fajardo, Jose ;
Giannoulakis, Ioannis ;
Kafetzakis, Emmanouil ;
Peng, Shuping ;
Perez-Romero, Jordi ;
Trajkovska, Irena ;
Nodashenas, Pouria S. ;
Goratti, Leonardo ;
Paolino, Michele ;
Sfakianakis, Evangelos ;
Liberal, Fidel ;
Xilouris, George .
COMPUTER STANDARDS & INTERFACES, 2017, 54 :216-228