Review Article

A Survey on Secure Deployment of Mobile Services in Edge Computing

Table 3

Challenges and methods of commercial MEC.

ChallengesReferenceMethod usedContribution

Risk of user data leakage[42]A VLAN based on security architectureIncrease protection to prevent accidental data leakage
Secure risk of data transmission[50]2D-DWT-1L or 2D-DWT-2L steganographyEnable to hide the confidential patient’s data and transfer data secretly
Security of terminal device[51]A terminal lightweight anonymous security communication schemeSupport access authentication for massive terminal devices