Survey on multi-access edge computing security and privacy
|Author:||Ranaweera, Pasika1; Jurcut, Anca Delia2; Liyanage, Madhusanka1,3|
1School of Computer Science, University College Dublin (UCD), Ireland
2University College Dublin (UCD), Ireland
3Centre for Wireless Communications, University of Oulu, Finland
|Online Access:||PDF Full Text (PDF, 6.2 MB)|
|Persistent link:|| http://urn.fi/urn:nbn:fi-fe202103157340
Institute of Electrical and Electronics Engineers,
|Publish Date:|| 2021-03-15
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MEC deployments. In this paper, we analyse the security and privacy of the MEC system. We introduce a thorough investigation of the identification and the analysis of threat vectors in the ETSI standardized MEC architecture. Furthermore, we analyse the vulnerabilities leading to the identified threat vectors and propose potential security solutions to overcome these vulnerabilities. The privacy issues of MEC are also highlighted, and clear objectives for preserving privacy are defined. Finally, we present future directives to enhance the security and privacy of MEC services.
IEEE communications surveys and tutorials
|Type of Publication:||
A1 Journal article – refereed
|Field of Science:||
213 Electronic, automation and communications engineering, electronics
This research is funded by the European Union under RESPONSE 5G (Grant No: 789658) and the Academy o fFinland under 6Genesis Flagship (Grant 318927) projects.
|Academy of Finland Grant Number:||
318927 (Academy of Finland Funding decision)
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.