Survey on Multi-Access Edge Computing Security and Privacy

被引:196
作者
Ranaweera, Pasika [1 ]
Jurcut, Anca Delia [1 ]
Liyanage, Madhusanka [1 ,2 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci, Dublin D04 V1W8 4, Ireland
[2] Univ Oulu, Ctr Wireless Commun, Oulu 90570, Finland
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2021年 / 23卷 / 02期
基金
芬兰科学院;
关键词
Security; Privacy; Cloud computing; 5G mobile communication; Servers; Real-time systems; Outsourcing; Multi-access edge computing (MEC); security; privacy; Internet of Things (IoT); 5G; cloud computing; future networks; OF-THE-ART; SERVICE MIGRATION; NETWORK; 5G; EFFICIENT; FOG; IOT; CHALLENGES; CLOUD; OPPORTUNITIES;
D O I
10.1109/COMST.2021.3062546
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MEC deployments. In this paper, we analyse the security and privacy of the MEC system. We introduce a thorough investigation of the identification and the analysis of threat vectors in the ETSI standardized MEC architecture. Furthermore, we analyse the vulnerabilities leading to the identified threat vectors and propose potential security solutions to overcome these vulnerabilities. The privacy issues of MEC are also highlighted, and clear objectives for preserving privacy are defined. Finally, we present future directives to enhance the security and privacy of MEC services.
引用
收藏
页码:1078 / 1124
页数:47
相关论文
共 210 条
[81]  
Jeon Y, 2018, IEEE ICCE
[82]   A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing [J].
Jia, Xiaoying ;
He, Debiao ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond .
IEEE SYSTEMS JOURNAL, 2020, 14 (01) :560-571
[83]  
Jian Z., 2017, Proceedings of_the_2017_International_Conference_on_Cryptography,_Security_and_Privacy, P142
[84]   Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks [J].
Jiao, Yutao ;
Wang, Ping ;
Niyato, Dusit ;
Suankaewmanee, Kongrath .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2019, 30 (09) :1975-1989
[85]  
Jurcut A., 2020, SN Comput. Sci., V1, P193, DOI [10.1007/s42979-020-00201-3, DOI 10.1007/S42979-020-00201-3]
[86]  
Jurcut A.D., 2020, IoT Security: Advances in Authentication, P27, DOI 10.1002/9781119527978.ch2
[87]  
Kashif U. A., 2019, CLOUD SECURITY CONCE, P393, DOI 10.4018/978-1-5225-8176-5
[88]   Software Defined Privacy [J].
Kemmer, Florian ;
Reich, Christoph ;
Knahl, Martin ;
Clarke, Nathan .
2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING WORKSHOP (IC2EW), 2016, :25-29
[89]   Towards secure mobile cloud computing: A survey [J].
Khan, Abdul Nasir ;
Kiah, M. L. Mat ;
Khan, Samee U. ;
Madani, Sajjad A. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05) :1278-1299
[90]   A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions [J].
Khan, Rabia ;
Kumar, Pardeep ;
Jayakody, Dushantha Nalin K. ;
Liyanage, Madhusanka .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01) :196-248