Survey on Multi-Access Edge Computing Security and Privacy

Files in This Item:
File Description SizeFormat 
MEC_Security_Survey_Final (1).pdf6.32 MBAdobe PDFDownload
Title: Survey on Multi-Access Edge Computing Security and Privacy
Authors: Ranaweera, PasikaJurcut, Anca DeliaLiyanage, Madhusanka
Permanent link:
Date: 26-Feb-2021
Online since: 2021-04-12T16:18:52Z
Abstract: The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MEC deployments. In this paper, we analyse the security and privacy of the MEC system. We introduce a thorough investigation of the identification and the analysis of threat vectors in the ETSI standardized MEC architecture. Furthermore, we analyse the vulnerabilities leading to the identified threat vectors and propose potential security solutions to overcome these vulnerabilities. The privacy issues of MEC are also highlighted, and clear objectives for preserving privacy are defined. Finally, we present future directives to enhance the security and privacy of MEC services.
Funding Details: Enterprise Ireland
European Commission Horizon 2020
Irish Research Council
Science Foundation Ireland
University College Dublin
Funding Details: Business Finland
Type of material: Journal Article
Publisher: IEEE
Journal: IEEE Communications Surveys & Tutorials
Copyright (published version): 2021 IEEE
Keywords: SecurityPrivacyCloud computing5G mobile communicationServersReal-time systemsOutsourcing
DOI: 10.1109/comst.2021.3062546
Language: en
Status of Item: Peer reviewed
ISSN: 1553-877X
This item is made available under a Creative Commons License:
Appears in Collections:Computer Science Research Collection

Show full item record

Page view(s)

Last Week
Last month
checked on May 10, 2021


checked on May 10, 2021

Google ScholarTM



If you are a publisher or author and have copyright concerns for any item, please email and the item will be withdrawn immediately. The author or person responsible for depositing the article will be contacted within one business day.