ML p(r)ior | Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges

Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges

2016-02-01
For various reasons, the cloud computing paradigm is unable to meet certain requirements (e.g. low latency and jitter, context awareness, mobility support) that are crucial for several applications (e.g. vehicular networks, augmented reality). To fulfil these requirements, various paradigms, such as fog computing, mobile edge computing, and mobile cloud computing, have emerged in recent years. While these edge paradigms share several features, most of the existing research is compartmentalised; no synergies have been explored. This is especially true in the field of security, where most analyses focus only on one edge paradigm, while ignoring the others. The main goal of this study is to holistically analyse the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration. In our results, we will show that all edge paradigms should consider the advances in other paradigms.
PDF

Highlights - Most important sentences from the article

Login to like/save this paper, take notes and configure your recommendations

Related Articles

2019-04-09

The evolving of Fifth Generation (5G) networks isbecoming more readily available as a major driver o… show more
PDF

Highlights - Most important sentences from the article

2018-08-15

With the Internet of Things (IoT) becoming part of our daily life and our environment, we expect rap… show more
PDF

Highlights - Most important sentences from the article

2019-01-16

Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastr… show more
PDF

Highlights - Most important sentences from the article

2019-05-04
1906.01055 | cs.CR

Abstract--- With the rapid growth of the Internet of Things (IoT), current Cloud systems face variou… show more
PDF

Highlights - Most important sentences from the article

2019-01-11

The growth of local data annually implies extra charges for the customers, which makes their busines… show more
PDF

Highlights - Most important sentences from the article

2019-03-13

With an enormous range of applications, Internet of Things (IoT) has magnetized industries and acade… show more
PDF

Highlights - Most important sentences from the article

2017-12-01

The fifth generation (5G) mobile telecommunication network is expected to support Multi- Access Edge… show more
PDF

Highlights - Most important sentences from the article

2018-09-30
1810.00305 | cs.DC

Contrary to using distant and centralized cloud data center resources, employing decentralized resou… show more
PDF

Highlights - Most important sentences from the article

2018-10-26

The ever-increasing growth in the number of connected smart devices and various Internet of Things (… show more
PDF

Highlights - Most important sentences from the article

2018-12-04

The edge of the network has the potential to host services for supporting a variety of user applicat… show more
PDF

Highlights - Most important sentences from the article

2017-11-06

This paper describes the achievements of the H2020 project INDIGO-DataCloud. The project has provide… show more
PDF

Highlights - Most important sentences from the article

2019-02-28

Internet of Things (IoT) and Network Softwarization are fast becoming core technologies of informati… show more
PDF

Highlights - Most important sentences from the article

2018-11-22

Emerging technologies that generate a huge amount of data such as the Internet of Things (IoT) servi… show more
PDF

Highlights - Most important sentences from the article

2017-05-23
1705.08449 | cs.CY

The Internet of Mobile Things encompasses stream data being generated by sensors, network communicat… show more
PDF

Highlights - Most important sentences from the article