Offloading Personal Security Applications to the network edge: a Mobile User case scenario

被引:0
作者
Montero, D. [1 ,2 ]
Serral-Gracia, R. [1 ]
机构
[1] Tech Univ Catalonia UPC, Networking & Informat Technol Lab NetIT Lab, Barcelona, Spain
[2] Dept Elect Elect & Telecommun Engn, Cuenca, Ecuador
来源
2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC) | 2016年
关键词
Security; virtualization; offloading; fog computing; mobility; NFV; SDN;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses some challenges that user mobility imposes over the user-centric protection model against security threats. This model is based on the idea of offloading the security applications from the end user device, and placing them in a trusted network node at the network's edge. Our research perspective is particularly centered around three interrelated mobility challenges, i) the allocation of the security applications "close" to the user, i.e., on network nodes with enhanced processing capabilities, ii) seamless mobility with negligible disruption of ongoing network connections, and iii) dynamic orchestration and management with support of security applications migration. Based on our arguments, we expose the main requirements and trade-offs to be considered in the attempt to support mobility in such environment. We propose a flexible solution that leverages Software Defined Networking, Network Function Virtualization and Computing at the Network Edge to offer a seamless on-path security protection to mobile users. Our preliminary experiments' results considering a WiFi mobile user show that seamless security migration and mobility are feasible in a simple real scenario. Vertical mobility and more complex use cases scenarios are envisioned for future research.
引用
收藏
页码:96 / 101
页数:6
相关论文
共 25 条
  • [1] Resource allocation and computation offloading with data security for mobile edge computing
    Elgendy, Ibrahim A.
    Zhang, Weizhe
    Tian, Yu-Chu
    Li, Keqin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 531 - 541
  • [2] Reinforcement Learning Based Offloading for Realtime Applications in Mobile Edge Computing
    Huang, Hui
    Ye, Qiang
    Du, Hongwei
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [3] Probabilistic computation offloading for mobile edge computing in dynamic network environment
    Bista, Bhed Bahadur
    Wang, Jiahong
    Takata, Toyoo
    INTERNET OF THINGS, 2020, 11
  • [4] A mechanism for network resource allocation and task offloading in mobile edge computing and network engineering
    Shu, Zhixu
    Zhang, Kewang
    COMPUTATIONAL INTELLIGENCE, 2024, 40 (01)
  • [5] Security of Personal Bio Data in Mobile Health Applications for the Elderly
    Kim, Jong Tak
    Kang, Un Gu
    Lee, Young Ho
    Lee, Byung Mun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (10): : 59 - 69
  • [6] User Plane Function Offloading in P4 switches for enhanced 5G Mobile Edge Computing
    Paolucci, Francesco
    Scano, Davide
    Cugini, Filippo
    Sgambelluri, Andrea
    Valcarenghi, Luca
    Cavazzoni, Carlo
    Ferraris, Giuseppe
    Castoldi, Piero
    2021 17TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS (DRCN), 2021,
  • [7] Safety-Critical Task Offloading Heuristics for Workflow Applications in Mobile Edge Computing
    Wang, Yushen
    Sun, Tianwen
    Yang, Guang
    Yang, Kai
    Song, Xuefei
    Zheng, Changling
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2023, 32 (11)
  • [8] Resource Allocation and Offloading Strategy in Mobile Edge Computing Considering Mobility and Inter-user Relevance
    Kang, Suyun
    Lu, Fanghe
    Hao, Wanming
    Yang, Shouyi
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [9] Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing
    Elgendy, Ibrahim A.
    Muthanna, Ammar
    Hammoudeh, Mohammad
    Shaiba, Hadil
    Unal, Devrim
    Khayyat, Mashael
    BIG DATA, 2021, 9 (04) : 265 - 278
  • [10] A user study on mobile virtualization to measure personal freedom vs. enterprise security
    Jaramillo, David
    Ackerbauer, Michael
    Woodburn, Stephen
    IEEE SOUTHEASTCON 2014, 2014,