A Survey on Secure Deployment of Mobile Services in Edge Computing

Mobile edge computing (MEC) is an emerging technology that is recognized as a key to 5G networks. Because MEC provides an IT service environment and cloud-computing services at the edge of the mobile network, researchers hope to use MEC for secure service deployment, such as Internet of vehicles, In...

Full description

Bibliographic Details
Main Authors: Mengmeng Cui, Yiming Fei, Yin Liu
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2021/8846239
id doaj-98efaae6a44742f2babba8bcc8ba95de
record_format Article
spelling doaj-98efaae6a44742f2babba8bcc8ba95de2021-02-15T12:52:42ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222021-01-01202110.1155/2021/88462398846239A Survey on Secure Deployment of Mobile Services in Edge ComputingMengmeng Cui0Yiming Fei1Yin Liu2School of Applied Technology, Nanjing University of Information Science & Technology, Nanjing 21000, ChinaSchool of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 21000, ChinaYunnan Air Traffic Mannagment Sub-Bureau, CAAC, Changshui International Airport, Kunming 650000, ChinaMobile edge computing (MEC) is an emerging technology that is recognized as a key to 5G networks. Because MEC provides an IT service environment and cloud-computing services at the edge of the mobile network, researchers hope to use MEC for secure service deployment, such as Internet of vehicles, Internet of Things (IoT), and autonomous vehicles. Because of the characteristics of MEC which do not have terminal servers, it tends to be deployed on the edge of networks. However, there are few related works that systematically introduce the deployment of MEC. Also, secure service deployment frameworks with MEC are even rare. For this reason, we have conducted a comprehensive and concrete survey of recent research studies on secure deployment. Although numerous research studies and experiments about MEC service deployment have been conducted, there are few systematic summaries that conclude basic concepts and development strategies about secure service deployment of commercial MEC. To make up for the gap, a detailed and complete survey about relative achievements is presented.http://dx.doi.org/10.1155/2021/8846239
collection DOAJ
language English
format Article
sources DOAJ
author Mengmeng Cui
Yiming Fei
Yin Liu
spellingShingle Mengmeng Cui
Yiming Fei
Yin Liu
A Survey on Secure Deployment of Mobile Services in Edge Computing
Security and Communication Networks
author_facet Mengmeng Cui
Yiming Fei
Yin Liu
author_sort Mengmeng Cui
title A Survey on Secure Deployment of Mobile Services in Edge Computing
title_short A Survey on Secure Deployment of Mobile Services in Edge Computing
title_full A Survey on Secure Deployment of Mobile Services in Edge Computing
title_fullStr A Survey on Secure Deployment of Mobile Services in Edge Computing
title_full_unstemmed A Survey on Secure Deployment of Mobile Services in Edge Computing
title_sort survey on secure deployment of mobile services in edge computing
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2021-01-01
description Mobile edge computing (MEC) is an emerging technology that is recognized as a key to 5G networks. Because MEC provides an IT service environment and cloud-computing services at the edge of the mobile network, researchers hope to use MEC for secure service deployment, such as Internet of vehicles, Internet of Things (IoT), and autonomous vehicles. Because of the characteristics of MEC which do not have terminal servers, it tends to be deployed on the edge of networks. However, there are few related works that systematically introduce the deployment of MEC. Also, secure service deployment frameworks with MEC are even rare. For this reason, we have conducted a comprehensive and concrete survey of recent research studies on secure deployment. Although numerous research studies and experiments about MEC service deployment have been conducted, there are few systematic summaries that conclude basic concepts and development strategies about secure service deployment of commercial MEC. To make up for the gap, a detailed and complete survey about relative achievements is presented.
url http://dx.doi.org/10.1155/2021/8846239
work_keys_str_mv AT mengmengcui asurveyonsecuredeploymentofmobileservicesinedgecomputing
AT yimingfei asurveyonsecuredeploymentofmobileservicesinedgecomputing
AT yinliu asurveyonsecuredeploymentofmobileservicesinedgecomputing
AT mengmengcui surveyonsecuredeploymentofmobileservicesinedgecomputing
AT yimingfei surveyonsecuredeploymentofmobileservicesinedgecomputing
AT yinliu surveyonsecuredeploymentofmobileservicesinedgecomputing
_version_ 1714867290929889280