A Survey on Secure Deployment of Mobile Services in Edge Computing
Mobile edge computing (MEC) is an emerging technology that is recognized as a key to 5G networks. Because MEC provides an IT service environment and cloud-computing services at the edge of the mobile network, researchers hope to use MEC for secure service deployment, such as Internet of vehicles, In...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2021-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2021/8846239 |
id |
doaj-98efaae6a44742f2babba8bcc8ba95de |
---|---|
record_format |
Article |
spelling |
doaj-98efaae6a44742f2babba8bcc8ba95de2021-02-15T12:52:42ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222021-01-01202110.1155/2021/88462398846239A Survey on Secure Deployment of Mobile Services in Edge ComputingMengmeng Cui0Yiming Fei1Yin Liu2School of Applied Technology, Nanjing University of Information Science & Technology, Nanjing 21000, ChinaSchool of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 21000, ChinaYunnan Air Traffic Mannagment Sub-Bureau, CAAC, Changshui International Airport, Kunming 650000, ChinaMobile edge computing (MEC) is an emerging technology that is recognized as a key to 5G networks. Because MEC provides an IT service environment and cloud-computing services at the edge of the mobile network, researchers hope to use MEC for secure service deployment, such as Internet of vehicles, Internet of Things (IoT), and autonomous vehicles. Because of the characteristics of MEC which do not have terminal servers, it tends to be deployed on the edge of networks. However, there are few related works that systematically introduce the deployment of MEC. Also, secure service deployment frameworks with MEC are even rare. For this reason, we have conducted a comprehensive and concrete survey of recent research studies on secure deployment. Although numerous research studies and experiments about MEC service deployment have been conducted, there are few systematic summaries that conclude basic concepts and development strategies about secure service deployment of commercial MEC. To make up for the gap, a detailed and complete survey about relative achievements is presented.http://dx.doi.org/10.1155/2021/8846239 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Mengmeng Cui Yiming Fei Yin Liu |
spellingShingle |
Mengmeng Cui Yiming Fei Yin Liu A Survey on Secure Deployment of Mobile Services in Edge Computing Security and Communication Networks |
author_facet |
Mengmeng Cui Yiming Fei Yin Liu |
author_sort |
Mengmeng Cui |
title |
A Survey on Secure Deployment of Mobile Services in Edge Computing |
title_short |
A Survey on Secure Deployment of Mobile Services in Edge Computing |
title_full |
A Survey on Secure Deployment of Mobile Services in Edge Computing |
title_fullStr |
A Survey on Secure Deployment of Mobile Services in Edge Computing |
title_full_unstemmed |
A Survey on Secure Deployment of Mobile Services in Edge Computing |
title_sort |
survey on secure deployment of mobile services in edge computing |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2021-01-01 |
description |
Mobile edge computing (MEC) is an emerging technology that is recognized as a key to 5G networks. Because MEC provides an IT service environment and cloud-computing services at the edge of the mobile network, researchers hope to use MEC for secure service deployment, such as Internet of vehicles, Internet of Things (IoT), and autonomous vehicles. Because of the characteristics of MEC which do not have terminal servers, it tends to be deployed on the edge of networks. However, there are few related works that systematically introduce the deployment of MEC. Also, secure service deployment frameworks with MEC are even rare. For this reason, we have conducted a comprehensive and concrete survey of recent research studies on secure deployment. Although numerous research studies and experiments about MEC service deployment have been conducted, there are few systematic summaries that conclude basic concepts and development strategies about secure service deployment of commercial MEC. To make up for the gap, a detailed and complete survey about relative achievements is presented. |
url |
http://dx.doi.org/10.1155/2021/8846239 |
work_keys_str_mv |
AT mengmengcui asurveyonsecuredeploymentofmobileservicesinedgecomputing AT yimingfei asurveyonsecuredeploymentofmobileservicesinedgecomputing AT yinliu asurveyonsecuredeploymentofmobileservicesinedgecomputing AT mengmengcui surveyonsecuredeploymentofmobileservicesinedgecomputing AT yimingfei surveyonsecuredeploymentofmobileservicesinedgecomputing AT yinliu surveyonsecuredeploymentofmobileservicesinedgecomputing |
_version_ |
1714867290929889280 |