2018
DOI: 10.3390/s18103211
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Multi-Tier Mobile Edge Computing Model for Data Processing Offloading Based on Degree of Trust

Abstract: Current mobile devices need to run applications with high computational demands and critical response times. The mobile edge computing (MEC) paradigm was developed to improve the performance of these devices. This new computation architecture allows for the mobile devices to execute applications on fog nodes at the network edge; this process is called data processing offloading. This article presents a security model for the externalization of application execution in multi-tier MEC environments. The principal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(31 citation statements)
references
References 38 publications
0
31
0
Order By: Relevance
“…Usually, cloudlets are deployed inside the organizations that use it [9,10]. The main advantages provided by cloudlets are twofold: in the first place, to reduce service disruptions and delays caused by the network to remote servers and secondly to ensure a high level of security of the data since it does not need to be sent through Internet [11]. Therefore, cloudlets are computing platforms similar to cloud servers but prepared and scaled according to the specific requirements of the organization.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Usually, cloudlets are deployed inside the organizations that use it [9,10]. The main advantages provided by cloudlets are twofold: in the first place, to reduce service disruptions and delays caused by the network to remote servers and secondly to ensure a high level of security of the data since it does not need to be sent through Internet [11]. Therefore, cloudlets are computing platforms similar to cloud servers but prepared and scaled according to the specific requirements of the organization.…”
Section: Related Workmentioning
confidence: 99%
“…Necessary data to be moved for computing the task t i in the platform p j of the layer k (11) notations and expression used in this paper are provided in Tables 3 and 4. First, we consider a granularity unit for offloading the application task.…”
Section: Notationmentioning
confidence: 99%
“…Evidence-based trust model can be any model that proves trust relationship among entities based on public-key, address, identity or any similar evidence that the entity can generate for itself or other users. For instance, Mora-Gimeno et al [44] present a security model for data processing that combines applications to multi-tier mobile edge architectures with ability to adjust the security levels of each tier (i.e. each tier requires authentication).…”
Section: Trust Management Approaches and Positioning Of The Present Workmentioning
confidence: 99%
“…Secure Multi-Tier Mobile Edge Computing Model [49] Formal framework to handle the security level of edge computing environments.…”
Section: (B) Edge Computingmentioning
confidence: 99%
“…Edge computing has a promising future since it decentralises the computing power along the network and produces clear benefits when it comes to response time and reliability [34]. The research lines in this field aim at reaching a smooth engagement with the IoT ecosystem, mainly by reducing the management complexity of dispersed edge resources and developing mechanisms to maintain the security perimeter for the data and applications [49].…”
Section: Future Trendsmentioning
confidence: 99%