Review Article
A Survey on Secure Deployment of Mobile Services in Edge Computing
Table 3
Challenges and methods of commercial MEC.
| Challenges | Reference | Method used | Contribution |
| Risk of user data leakage | [42] | A VLAN based on security architecture | Increase protection to prevent accidental data leakage | Secure risk of data transmission | [50] | 2D-DWT-1L or 2D-DWT-2L steganography | Enable to hide the confidential patient’s data and transfer data secretly | Security of terminal device | [51] | A terminal lightweight anonymous security communication scheme | Support access authentication for massive terminal devices |
|
|