Security and Communication Networks

Secure Deployment of Commercial Services in Mobile Edge Computing


Publishing date
01 Jan 2021
Status
Published
Submission deadline
14 Aug 2020

Lead Editor

1Nanjing University of Information Science and Technology, Nanjing, China

2Macquarie University, Sydney, Australia

3Brandon University, Brandon, Canada

4Norwegian University of Science & Technology, Aalesund, Norway

5Nanjing University, Nanjing, China


Secure Deployment of Commercial Services in Mobile Edge Computing

Description

Currently, mobile edge computing (MEC) is one of the most popular techniques used to respond to real-time services from a wide range of mobile terminals. Despite these terminals, commercial service providers (CSPs), such as video content providers, can also benefit from low-latency edge resources to provide their users with more efficient service acquisition, thereby improving the quality of experience (QoE).

Generally, public telecommunication operators construct edge servers (ESs), and each ES is collocated with a base station in a 5G network that receives various commercial services from the CSPs. For this new commercial mode in MEC, how to construct the pricing model is an urgent issue for attracting CSPs to accommodate their services in commercial ESs. In addition to this, CSPs have major concerns regarding security and privacy, since the commercial services are often from different organizations. Therefore, establishing effective security and trust mechanisms for the ESs is necessary in the industrial application of MEC.

This Special Issue welcomes theoretical and applied contributions for designing secure and privacy-aware mechanisms and algorithms in the deployment of commercial services in MEC. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Secure service deployment framework for commercial MEC
  • Privacy-aware service offloading in commercial MEC
  • Pricing model design for MEC
  • Secure service migration across ESs in commercial MEC
  • Secure service selection for commercial MEC
  • Secure service composition for commercial MEC
  • Secure service recommendation for commercial MEC
  • Attack analysis for commercial MEC
  • Protocols and architecture design for commercial MEC
  • Applications for securing commercial services in MEC

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 9856969
  • - Corrigendum

Corrigendum to “Rational Protocols and Attacks in Blockchain System”

Tao Li | Yuling Chen | ... | Yixian Yang
  • Special Issue
  • - Volume 2021
  • - Article ID 8846239
  • - Review Article

A Survey on Secure Deployment of Mobile Services in Edge Computing

Mengmeng Cui | Yiming Fei | Yin Liu
  • Special Issue
  • - Volume 2020
  • - Article ID 8843803
  • - Research Article

A Group Recommendation System of Network Document Resource Based on Knowledge Graph and LSTM in Edge Computing

Yuezhong Wu | Qiang Liu | ... | Ziran Peng
  • Special Issue
  • - Volume 2020
  • - Article ID 8861639
  • - Research Article

cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing

Afifa Maryam | Usman Ahmed | ... | Muhammad Azhar Iqbal
  • Special Issue
  • - Volume 2020
  • - Article ID 8857564
  • - Research Article

A Prediction Approach for Video Hits in Mobile Edge Computing Environment

Xiulei Liu | Shoulu Hou | ... | Junyang Yu
  • Special Issue
  • - Volume 2020
  • - Article ID 8822990
  • - Research Article

Deploying GIS Services into the Edge: A Study from Performance Evaluation and Optimization Viewpoint

Jianbing Zhang | Bowen Ma | Jiwei Huang
  • Special Issue
  • - Volume 2020
  • - Article ID 8825749
  • - Research Article

High-Performance Routing Emulation Technologies Based on a Cloud Platform

Jianyu Chen | Xiaofeng Wang | ... | Yuan Liu
  • Special Issue
  • - Volume 2020
  • - Article ID 8881640
  • - Research Article

An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment

Sa Math | Lejun Zhang | ... | Intae Ryoo
  • Special Issue
  • - Volume 2020
  • - Article ID 8848389
  • - Research Article

A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols

Behnam Zahednejad | Lishan Ke | Jing Li
  • Special Issue
  • - Volume 2020
  • - Article ID 8822985
  • - Research Article

Routing Strategy for LEO Satellite Networks Based on Membership Degree Functions

Jian Zhou | Qian Bo | ... | Xiaoyong Yan
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.