Survey on Multi-Access Edge Computing Security and Privacy

被引:196
作者
Ranaweera, Pasika [1 ]
Jurcut, Anca Delia [1 ]
Liyanage, Madhusanka [1 ,2 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci, Dublin D04 V1W8 4, Ireland
[2] Univ Oulu, Ctr Wireless Commun, Oulu 90570, Finland
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2021年 / 23卷 / 02期
基金
芬兰科学院;
关键词
Security; Privacy; Cloud computing; 5G mobile communication; Servers; Real-time systems; Outsourcing; Multi-access edge computing (MEC); security; privacy; Internet of Things (IoT); 5G; cloud computing; future networks; OF-THE-ART; SERVICE MIGRATION; NETWORK; 5G; EFFICIENT; FOG; IOT; CHALLENGES; CLOUD; OPPORTUNITIES;
D O I
10.1109/COMST.2021.3062546
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MEC deployments. In this paper, we analyse the security and privacy of the MEC system. We introduce a thorough investigation of the identification and the analysis of threat vectors in the ETSI standardized MEC architecture. Furthermore, we analyse the vulnerabilities leading to the identified threat vectors and propose potential security solutions to overcome these vulnerabilities. The privacy issues of MEC are also highlighted, and clear objectives for preserving privacy are defined. Finally, we present future directives to enhance the security and privacy of MEC services.
引用
收藏
页码:1078 / 1124
页数:47
相关论文
共 210 条
[31]  
Das P. K., 2019, CENSORSHIP SURVEILLA, P1203
[32]   A Game Theoretical Based System Using Holt-Winters and Genetic Algorithm With Fuzzy Logic for DoS/DDoS Mitigation on SDN Networks [J].
De Assis, Marcos V. O. ;
Hamamoto, Anderson H. ;
Abrao, Taufik ;
Proenca, Mario Lemes, Jr. .
IEEE ACCESS, 2017, 5 :9485-9496
[33]  
Devi S, 2016, INT J COMPUT NETW CO, V4, P237
[34]   Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things [J].
Du, Miao ;
Wang, Kun ;
Chen, Yuanfang ;
Wang, Xiaoyan ;
Sun, Yanfei .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (08) :62-67
[35]  
Edwards N., 2016, U.S. Patent, Patent No. [15 021 032, 15021032]
[36]   Resource allocation and computation offloading with data security for mobile edge computing [J].
Elgendy, Ibrahim A. ;
Zhang, Weizhe ;
Tian, Yu-Chu ;
Li, Keqin .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :531-541
[37]  
Esposito C, 2018, IEEE CLOUD COMPUT, V5, P31
[38]  
ETSI, 2014, MOBILE EDGE COMPUTIN
[39]  
ETSI, 2016, MOBILE EDGE COMPUTIN
[40]  
ETSI, 2015, Network Functions Virtualization (NFV)