The IUP Journal of Computer Sciences
Mobile Edge Computing: Security and Privacy Issues, Challenges and Countermeasures

Article Details
Pub. Date : Aprill, 2022
Product Name : The IUP Journal of Computer Sciences
Product Type : Article
Product Code : IJCS010422
Author Name : Malik Zaib Alam, Sarfaraz Ahmed, Haneef Khan, Md Imran Alam, Mohammad Rafeek Khan and Shams Tabrez Siddiqui
Availability : YES
Subject/Domain : Management
Download Format : PDF Format
No. of Pages : 09

Price

Download
Abstract

Mobile Edge Computing (MEC) is a novel technology that provides fast data processing with efficiency on 5G networks. It can be propitious in Internet of Things (IoT)-based contexts, as it renders a cloud-computing and IT services environment. Moreover, MEC has no terminal servers, as it is often deployed near the network's edge. However, the unique features and working principles of MEC will lead to a number of new security and privacy-related concerns. In this paper, the security issues are discussed along with their multiple solutions. Finally, suggestions to strengthen the security of MEC services are offered.


Introduction

Mobile Edge Computing (MEC) was presented in 2013 when Nokia Siemens and IBM collaborated to establish an MEC platform on which applications could be executed directly. Later, the European Telecommunications Standards Institute (ETSI) and the Industry Specification Group (ISG) standardized MEC (ISG). As previously stated, the European 5G Infrastructure Public Private Partnership (PPP) considers MEC to be a leading emerging technology (Abbas et al., 2017). The use of sensors and a large number of IoT devices such as gadgets has grown rapidly in recent years. According to an Ericsson's study, it is anticipated that 32 billion devices would be linked to the mobile network by 2030, representing a doubling of the current number. The ETSI


Keywords

Mobile Edge Computing (MEC), Security, Cloud computing, Cellular network, Internet of Things (IoT)