دانلود رایگان مقاله انگلیسی محاسبات لبه موبایل، مه و غیره: تحلیل تهدیدها و چالش های امنیتی - الزویر 2018

عنوان فارسی
محاسبات لبه موبایل، مه و غیره: بررسی و تحلیل تهدیدها و چالش های امنیتی
عنوان انگلیسی
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
67
سال انتشار
2018
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
نوع مقاله
ISI
نوع نگارش
مقالات پژوهشی (تحقیقاتی)
رفرنس
دارد
پایگاه
اسکوپوس
کد محصول
E10670
رشته های مرتبط با این مقاله
مهندسی کامپیوتر
گرایش های مرتبط با این مقاله
رایانش ابری، امنیت اطلاعات
مجله
نسل آینده سیستم های کامپیوتری - Future Generation Computer Systems
دانشگاه
Computer Science Department - University of Malaga - Ada Byron building - Spain
کلمات کلیدی
امنیت، حریم خصوصی، محاسبات ابری، محاسبات مه، محاسبات لبه موبایل، محاسبات ابری موبایل
doi یا شناسه دیجیتال
http://dx.doi.org/10.1016/j.future.2016.11.009
چکیده

Abstract


For various reasons, the cloud computing paradigm is unable to meet certain requirements (e.g. low latency and jitter, context awareness, mobility support) that are crucial for several applications (e.g. vehicular networks, augmented reality). To fulfil these requirements, various paradigms, such as fog computing, mobile edge computing, and mobile cloud computing, have emerged in recent years. While these edge paradigms share several features, most of the existing research is compartmentalised; no synergies have been explored. This is especially true in the field of security, where most analyses focus only on one edge paradigm, while ignoring the others. The main goal of this study is to holistically analyse the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration. In our results, we will show that all edge paradigms should consider the advances in other paradigms.

نتیجه گیری

Conclusions


In this study, we have analysed from a holistic perspective the security threats and challenges that affect edge paradigms, such as fog computing, mobile edge computing, and mobile cloud computing. In the first part of our analysis, we identified the features and problems that are common to all edge paradigms. In the second part, we provided a novel analysis of the multiple threats that target all edge paradigms, alongside a detailed study regarding the state of the art of security mechanisms that should be integrated into all edge paradigms. As a conclusion of this analysis, we have shown that research should not be compartmentalised, but all edge paradigms should consider the advances in other paradigms. Nevertheless, the security of edge paradigms is still in its infancy; thus, there are multiple open issues that merit consideration in the near future.


بدون دیدگاه