Review Article

A Survey on Secure Deployment of Mobile Services in Edge Computing

Table 1

Comparisons of frameworks based on different ways.

Properties[23][24][25][26][27][28][29][30][31]

Minimum execution timeYNYNNNNN/AN/A
Network latencyLHN/ALLMLN/AN/A
Transmission delayMHHN/AN/AMMN/AN/A
Preexecution delayHN/AHLN/AN/AHLH
Maximum privacy and securityN/ANNNNYYN/AN/A
Offloading overheadHHHN/AN/AHHN/AN/A

Y = yes; N = no; H = high; M = medium; L = low; N/A = not applicable.