scholarly journals Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 18706-18721
Author(s):  
Belal Ali ◽  
Mark A. Gregory ◽  
Shuo Li
2021 ◽  
Vol 5 (4) ◽  
pp. 52
Author(s):  
Huseyn Huseynov ◽  
Tarek Saadawi ◽  
Kenichi Kourai

The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual life. One of the emerging technologies that enables the evolution to 5G by bringing cloud capabilities near to the end users is Edge Computing or also known as Multi-Access Edge Computing (MEC) that will become pertinent towards the evolution of 5G. This evolution also entails growth in the threat landscape and increase privacy in concerns at different application areas, hence security and privacy plays a central role in the evolution towards 5G. Since MEC application instantiated in the virtualized infrastructure, in this paper we present a distributed application that aims to constantly introspect multiple virtual machines (VMs) in order to detect malicious activities based on their anomalous behavior. Once suspicious processes detected, our IDS in real-time notifies system administrator about the potential threat. Developed software is able to detect keyloggers, rootkits, trojans, process hiding and other intrusion artifacts via agent-less operation, by operating remotely or directly from the host machine. Remote memory introspection means no software to install, no notice to malware to evacuate or destroy data. Experimental results of remote VMI on more than 50 different malicious code demonstrate average anomaly detection rate close to 97%. We have established wide testbed environment connecting networks of two universities Kyushu Institute of Technology and The City College of New York through secure GRE tunnel. Conducted experiments on this testbed deliver high response time of the proposed system.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 18209-18237 ◽  
Author(s):  
Jiale Zhang ◽  
Bing Chen ◽  
Yanchao Zhao ◽  
Xiang Cheng ◽  
Feng Hu

Author(s):  
Pasika Ranaweera ◽  
Anca Delia Jurcut ◽  
Madhusanka Liyanage

Author(s):  
Chinnasamy P. ◽  
Rojaramani D. ◽  
Praveena V. ◽  
Annlin Jeba S. V. ◽  
Bensujin B.

Several researchers analyzed the information security problems in edge computing, though not all studied the criteria for security and confidentiality in detail. This chapter intends to extensively evaluate the edge computing protection and confidentiality standards and the different technical approaches utilized by the technologies often used mitigate the risks. This study describes the latest research and emphasizes the following: (1) the definition of edge computing protection and confidentiality criteria, (2) state-of-the-art strategies used to mitigate protection and privacy risks, (3) developments in technical approaches, (4) measures used to measure the efficiency of interventions, (5) the categorization of threats on the edge device and the related technical pattern used to mitigate the attackers, and (6) research directions for potential professionals in the field of edge devices privacy and security.


Author(s):  
Da-Yin Liao

Contemporary 300mm semiconductor manufacturing systems have highly automated and digitalized cyber-physical integration. They suffer from the profound problems of integrating large, centralized legacy systems with small islands of automation. With the recent advances in disruptive technologies, semiconductor manufacturing has faced dramatic pressures to reengineer its automation and computer integrated systems. This paper proposes a Distributed-Ledger, Edge-Computing Architecture (DLECA) for automation and computer integration in semiconductor manufacturing. Based on distributed ledger and edge computing technologies, DLECA establishes a decentralized software framework where manufacturing data are stored in distributed ledgers and processed locally by executing smart contracts at the edge nodes. We adopt an important topic of automation and computer integration for semiconductor research &development (R&D) operations as the study vehicle to illustrate the operational structure and functionality, applications, and feasibility of the proposed DLECA software framework.


2015 ◽  
Author(s):  
Anand Shah ◽  
Shishir Dahake ◽  
Sri Hari Haran J

2019 ◽  
Vol 3 (2) ◽  
pp. 26-34 ◽  
Author(s):  
Lanfranco Zanzi ◽  
Flavio Cirillo ◽  
Vincenzo Sciancalepore ◽  
Fabio Giust ◽  
Xavier Costa-Perez ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document