Survey on Multi-Access Edge Computing Security and Privacy

被引:198
作者
Ranaweera, Pasika [1 ]
Jurcut, Anca Delia [1 ]
Liyanage, Madhusanka [1 ,2 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci, Dublin D04 V1W8 4, Ireland
[2] Univ Oulu, Ctr Wireless Commun, Oulu 90570, Finland
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2021年 / 23卷 / 02期
基金
芬兰科学院;
关键词
Security; Privacy; Cloud computing; 5G mobile communication; Servers; Real-time systems; Outsourcing; Multi-access edge computing (MEC); security; privacy; Internet of Things (IoT); 5G; cloud computing; future networks; OF-THE-ART; SERVICE MIGRATION; NETWORK; 5G; EFFICIENT; FOG; IOT; CHALLENGES; CLOUD; OPPORTUNITIES;
D O I
10.1109/COMST.2021.3062546
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MEC deployments. In this paper, we analyse the security and privacy of the MEC system. We introduce a thorough investigation of the identification and the analysis of threat vectors in the ETSI standardized MEC architecture. Furthermore, we analyse the vulnerabilities leading to the identified threat vectors and propose potential security solutions to overcome these vulnerabilities. The privacy issues of MEC are also highlighted, and clear objectives for preserving privacy are defined. Finally, we present future directives to enhance the security and privacy of MEC services.
引用
收藏
页码:1078 / 1124
页数:47
相关论文
共 210 条
[111]   Fast Transmission Mechanism for Secure VPLS Architectures [J].
Liyanage, Madhusanka ;
Ylianttila, Mika ;
Gurtov, Andrei .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2017, :192-196
[112]   Opportunities and Challenges of Software-Defined Mobile Networks in Network Security [J].
Liyanage, Madhusanka ;
Abro, Ahmed Bux ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE SECURITY & PRIVACY, 2016, 14 (04) :34-44
[113]  
Liyanage M, 2015, INT CONF IND INF SYS, P220, DOI 10.1109/ICIINFS.2015.7399014
[114]   An SDN/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforcement [J].
Lorenz, Claas ;
Hock, David ;
Scherer, Johann ;
Durner, Raphael ;
Kellerer, Wolfgang ;
Gebert, Steffen ;
Gray, Nicholas ;
Zinner, Thomas ;
Tran-Gia, Phuoc .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (03) :217-223
[115]   Managing Physical Layer Security in Wireless Cellular Networks: A Cyber Insurance Approach [J].
Lu, Xiao ;
Niyato, Dusit ;
Privault, Nicolas ;
Jiang, Hai ;
Wang, Ping .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (07) :1648-1661
[116]   Mobile Edge Computing: A Survey on Architecture and Computation Offloading [J].
Mach, Pavel ;
Becvar, Zdenek .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (03) :1628-1656
[117]   LIVE SERVICE MIGRATION IN MOBILE EDGE CLOUDS [J].
Machen, Andrew ;
Wang, Shiqiang ;
Leung, Kin K. ;
Ko, Bong Jun ;
Salonidis, Theodoros .
IEEE WIRELESS COMMUNICATIONS, 2018, 25 (01) :140-147
[118]   Adaptive artificial immune networks for mitigating DoS flooding attacks [J].
Maestre Vidal, Jorge ;
Sandoval Orozco, Ana Lucila ;
Garcia Villalba, Luis Javier .
SWARM AND EVOLUTIONARY COMPUTATION, 2018, 38 :94-108
[119]  
Mahalat MH, 2018, PROCEEDINGS OF THE 2018 8TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2018), P183, DOI 10.1109/ISED.2018.8703993
[120]   Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain [J].
Manzoor, Ahsan ;
Braeken, An ;
Kanhere, Salil S. ;
Ylianttila, Mika ;
Liyanage, Madhsanka .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 176