A data security and privacy scheme for user quality of experience in a Mobile Edge Computing-based network

被引:6
|
作者
Sindjoung, Miguel Landry Foko [1 ]
Velempini, Mthulisi [1 ]
Djamegni, Clementin Tayou [2 ]
机构
[1] Univ Limpopo, Dept Comp Sci, Mankweng, South Africa
[2] Univ Dschang, Fotso Victor Univ Inst Technol, Dschang, Cameroon
基金
新加坡国家研究基金会;
关键词
Autonomous vehicular network; Data security and privacy; Mobile edge computing; User authentication; User quality of experience; Quality of service; KEY AGREEMENT SCHEME; AUTHENTICATION SCHEME;
D O I
10.1016/j.array.2023.100304
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing has widely been used for applications that require huge computational and data storage resources. Unfortunately, with the advent of new technologies such as fifth generation of cellular networks that provide new applications like IoT, cloud computing presents many limits among which the End-To-End (E2E) latency is the main challenge. These applications generally degrade scenarios that require low latency. Mobile Edge Computing (MEC) has been proposed to solve this issue. MEC brings computing and storage resources from cloud data center to edge data center, closer to end-user equipment to reduce the E2E latency for request processing. However, MEC is vulnerable to security, data privacy, and authentication that affect the end-user Quality of Experience (QoE). It is therefore fundamental that these challenges are addressed to avoid poor user experience due to the lack of security or data privacy. In this paper, we propose a hybrid cryptographic system that uses the symmetric and asymmetric cryptographic systems, to improve data security, privacy, and user authentication in a MEC-based network. We show that our proposed scheme is secured by validating it with the Automated Validation of Internet Security Protocol and Application tool. Simulation results show that our solution consumes less computing resources.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Dynamic trust security approach for edge computing-based mobile IoT devices using artificial intelligence
    Jedidi, Ahmed
    ENGINEERING RESEARCH EXPRESS, 2024, 6 (02):
  • [22] Edge Computing-Based Imagery Data Preprocessing Strategy
    Liu, Shufan
    Guan, Shanyue
    HEALTH MONITORING OF STRUCTURAL AND BIOLOGICAL SYSTEMS XVIII, 2024, 12951
  • [23] Fog computing-based privacy preserving data aggregation protocols
    Okay, Feyza Yildirim
    Ozdemir, Suat
    Xiao, Yang
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (04)
  • [24] Differential privacy location data release based on quadtree in mobile edge computing
    Liu, Gang
    Tang, Ziwen
    Wan, Bo
    Li, Yanfei
    Liu, Yan
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06):
  • [25] Mobile Edge Computing-Based Data-Driven Deep Learning Framework for Anomaly Detection
    Hussain, Bilal
    Du, Qinghe
    Zhang, Sinai
    Imran, Ali
    Imran, Muhammad Ali
    IEEE ACCESS, 2019, 7 : 137656 - 137667
  • [26] The Security and Privacy of Mobile-Edge Computing: An Artificial Intelligence Perspective
    Wang, Cheng
    Yuan, Zenghui
    Zhou, Pan
    Xu, Zichuan
    Li, Ruixuan
    Wu, Dapeng Oliver
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (24) : 22008 - 22032
  • [27] Edge computing-based big data privacy preservation in motion trajectory prediction for martial arts training
    Wang, Xue
    Peng, Xinxin
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [28] A Trust Computing-based Security Routing Scheme for Cyber Physical Systems
    Liu, Yuxin
    Liu, Xiao
    Liu, Anfeng
    Xiong, Neal N.
    Liu, Fang
    ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2019, 10 (06)
  • [29] A mobile edge computing-based applications execution framework for Internet of Vehicles
    Libing WU
    Rui ZHANG
    Qingan LI
    Chao MA
    Xiaochuan SHI
    Frontiers of Computer Science, 2022, 16 (05) : 129 - 139
  • [30] A mobile edge computing-based applications execution framework for Internet of Vehicles
    Libing Wu
    Rui Zhang
    Qingan Li
    Chao Ma
    Xiaochuan Shi
    Frontiers of Computer Science, 2022, 16