A data security and privacy scheme for user quality of experience in a Mobile Edge Computing-based network

被引:6
|
作者
Sindjoung, Miguel Landry Foko [1 ]
Velempini, Mthulisi [1 ]
Djamegni, Clementin Tayou [2 ]
机构
[1] Univ Limpopo, Dept Comp Sci, Mankweng, South Africa
[2] Univ Dschang, Fotso Victor Univ Inst Technol, Dschang, Cameroon
基金
新加坡国家研究基金会;
关键词
Autonomous vehicular network; Data security and privacy; Mobile edge computing; User authentication; User quality of experience; Quality of service; KEY AGREEMENT SCHEME; AUTHENTICATION SCHEME;
D O I
10.1016/j.array.2023.100304
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing has widely been used for applications that require huge computational and data storage resources. Unfortunately, with the advent of new technologies such as fifth generation of cellular networks that provide new applications like IoT, cloud computing presents many limits among which the End-To-End (E2E) latency is the main challenge. These applications generally degrade scenarios that require low latency. Mobile Edge Computing (MEC) has been proposed to solve this issue. MEC brings computing and storage resources from cloud data center to edge data center, closer to end-user equipment to reduce the E2E latency for request processing. However, MEC is vulnerable to security, data privacy, and authentication that affect the end-user Quality of Experience (QoE). It is therefore fundamental that these challenges are addressed to avoid poor user experience due to the lack of security or data privacy. In this paper, we propose a hybrid cryptographic system that uses the symmetric and asymmetric cryptographic systems, to improve data security, privacy, and user authentication in a MEC-based network. We show that our proposed scheme is secured by validating it with the Automated Validation of Internet Security Protocol and Application tool. Simulation results show that our solution consumes less computing resources.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] An optimization scheme of data link security transmission based on mobile edge computing
    Zhang, Han
    Xue, Jianbin
    Guan, Xiangrui
    Ma, Zerou
    Xu, Jialing
    AD HOC NETWORKS, 2024, 162
  • [2] On Differential Privacy-Based Framework for Enhancing User Data Privacy in Mobile Edge Computing Environment
    Sharma, Jhilakshi
    Kim, Donghyun
    Lee, Ahyoung
    Seo, Daehee
    IEEE ACCESS, 2021, 9 : 38107 - 38118
  • [3] Privacy-preserving task allocation for edge computing-based mobile crowdsensing
    Ding, Xuyang
    Lv, Ruizhao
    Pang, Xiaoyi
    Hu, Jiahui
    Wang, Zhibo
    Yang, Xu
    Li, Xiong
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 97
  • [4] Edge Computing-Based Security Framework for Big Data Analytics in VANETs
    Garg, Sahil
    Singh, Amritpal
    Kaur, Kuljeet
    Aujla, Gagangeet Singh
    Batra, Shalini
    Kumar, Neeraj
    Obaidat, M. S.
    IEEE NETWORK, 2019, 33 (02): : 72 - 81
  • [5] Edge Computing-Based Mobile Health System: Network Architecture and Resource Allocation
    Lin, Di
    Tang, Yu
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1716 - 1727
  • [6] A survey of edge computing-based designs for IoT security
    Kewei Sha
    T.Andrew Yang
    Wei Wei
    Sadegh Davari
    Digital Communications and Networks, 2020, 6 (02) : 195 - 202
  • [7] A survey of edge computing-based designs for IoT security
    Sha, Kewei
    Yang, T. Andrew
    Wei, Wei
    Davari, Sadegh
    DIGITAL COMMUNICATIONS AND NETWORKS, 2020, 6 (02) : 195 - 202
  • [8] A Survey of Security Architectures for Edge Computing-Based IoT
    Fazeldehkordi, Elahe
    Gronli, Tor-Morten
    IOT, 2022, 3 (03): : 332 - 365
  • [9] An Efficient Computing Offloading Scheme Based on Privacy-Preserving in Mobile Edge Computing Networks
    Pang, Shanchen
    Sun, Huanhuan
    Wang, Min
    Wang, Shuyu
    Qiao, Sibo
    Xiong, Neal N.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [10] Edge Computing-Based Scheme for Post-Quantum IoT Security for e-Health
    Minhas N.N.
    Mansoor K.
    IEEE Internet of Things Journal, 2024, 11 (19) : 1 - 1