4.7 Article

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges

Publisher

ELSEVIER
DOI: 10.1016/j.future.2016.11.009

Keywords

Security; Privacy; Cloud computing; Fog computing; Mobile edge computing; Mobile cloud computing

Funding

  1. panish Ministry of Economy and Competitiveness through the PERSIST [TIN2013-41739-R]
  2. European Commission through the NeCS [H2020-MSCA-ITN-2015-675320]

Ask authors/readers for more resources

For various reasons, the cloud computing paradigm is unable to meet certain requirements (e.g. low latency and jitter, context awareness, mobility support) that are crucial for several applications (e.g. vehicular networks, augmented reality). To fulfill these requirements, various paradigms, such as fog computing, mobile edge computing, and mobile cloud computing, have emerged in recent years. While these edge paradigms share several features, most of the existing research is compartmentalized; no synergies have been explored. This is especially true in the field of security, where most analyses focus only on one edge paradigm, while ignoring the others. The main goal of this study is to holistically analyze the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration. In our results, we will show that all edge paradigms should consider the advances in other paradigms. (C) 2016 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available