Survey on Multi-Access Edge Computing Security and Privacy

被引:198
作者
Ranaweera, Pasika [1 ]
Jurcut, Anca Delia [1 ]
Liyanage, Madhusanka [1 ,2 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci, Dublin D04 V1W8 4, Ireland
[2] Univ Oulu, Ctr Wireless Commun, Oulu 90570, Finland
基金
芬兰科学院;
关键词
Security; Privacy; Cloud computing; 5G mobile communication; Servers; Real-time systems; Outsourcing; Multi-access edge computing (MEC); security; privacy; Internet of Things (IoT); 5G; cloud computing; future networks; OF-THE-ART; SERVICE MIGRATION; NETWORK; 5G; EFFICIENT; FOG; IOT; CHALLENGES; CLOUD; OPPORTUNITIES;
D O I
10.1109/COMST.2021.3062546
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MEC deployments. In this paper, we analyse the security and privacy of the MEC system. We introduce a thorough investigation of the identification and the analysis of threat vectors in the ETSI standardized MEC architecture. Furthermore, we analyse the vulnerabilities leading to the identified threat vectors and propose potential security solutions to overcome these vulnerabilities. The privacy issues of MEC are also highlighted, and clear objectives for preserving privacy are defined. Finally, we present future directives to enhance the security and privacy of MEC services.
引用
收藏
页码:1078 / 1124
页数:47
相关论文
共 211 条
[131]   Network Slicing for 5G with SDN/NFV: Concepts, Architectures, and Challenges [J].
Ordonez-Lucena, Jose ;
Ameigeiras, Pablo ;
Lopez, Diego ;
Ramos-Munoz, Juan J. ;
Lorca, Javier ;
Folgueira, Jesus .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (05) :80-87
[132]   A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions [J].
Parvez, Imtiaz ;
Rahmati, Ali ;
Guvenc, Ismail ;
Sarwat, Arif I. ;
Dai, Huaiyu .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3098-3130
[133]   A First Step Towards Security Extension for NFV Orchestrator [J].
Pattaranantakul, Montida ;
Tseng, Yuchia ;
He, Ruan ;
Zhang, Zonghua ;
Meddahi, Ahmed .
SDN-NFVSEC'17: PROCEEDINGS OF THE ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION, 2017, :25-30
[134]  
Pattaranantakul M, 2016, IEEE TRUST BIG, P598, DOI [10.1109/TrustCom.2016.114, 10.1109/TrustCom.2016.0115]
[135]   A Survey on Mobile Edge Computing: Focusing on Service Adoption and Provision [J].
Peng, Kai ;
Leung, Victor C. M. ;
Xu, Xiaolong ;
Zheng, Lixin ;
Wang, Jiabin ;
Huang, Qingjia .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
[136]  
Porambage P., 2019, SEC EDGEAI VISION US
[137]  
Porambage P., 2019, IEEE WCNC, P1, DOI DOI 10.1109/wcnc.2019.8885900
[138]  
Porambage P, 2019, SEC EDGEAI EDGE SECU
[139]   Survey on Multi-Access Edge Computing for Internet of Things Realization [J].
Porambage, Pawani ;
Okwuibe, Jude ;
Liyanage, Madhusanka ;
Ylianttila, Mika ;
Taleb, Tarik .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :2961-2991
[140]   CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection [J].
Qiang, Weizhong ;
Xu, Gongping ;
Dai, Weiqi ;
Zou, Deqing ;
Jin, Hai .
IEEE ACCESS, 2017, 5 :21962-21976