Security and Communication Networks

Secure Deployment of Commercial Services in Mobile Edge Computing 2021


Publishing date
01 Mar 2022
Status
Closed
Submission deadline
05 Nov 2021

Lead Editor

1Nanjing University of Information Science and Technology, Nanjing, China

2Macquarie University, Sydney, Australia

3Brandon University, Brandon, Canada

4Norwegian University of Science & Technology, Aalesund, Norway

5Nanjing University, Nanjing, China

This issue is now closed for submissions.

Secure Deployment of Commercial Services in Mobile Edge Computing 2021

This issue is now closed for submissions.

Description

Currently, mobile edge computing (MEC) is one of the most popular techniques used to respond to real-time services from a wide range of mobile terminals. Despite these terminals, commercial service providers (CSPs), such as video content providers, can also benefit from low-latency edge resources to provide their users with more efficient service acquisition, thereby improving the quality of experience (QoE).

Generally, public telecommunication operators construct edge servers (ESs), and each ES is collocated with a base station in a 5G network that receives various commercial services from the CSPs. For this new commercial mode in MEC, how to construct the pricing model is an urgent issue for attracting CSPs to accommodate their services in commercial ESs. In addition to this, CSPs have major concerns regarding security and privacy, since the commercial services are often from different organizations. Therefore, establishing effective security and trust mechanisms for the ESs is necessary for the industrial application of MEC.

This Special Issue welcomes theoretical and applied contributions for designing secure and privacy-aware mechanisms and algorithms in the deployment of commercial services in MEC. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Secure service deployment framework for commercial MEC
  • Privacy-aware service offloading in commercial MEC
  • Pricing model design for MEC
  • Secure service migration across ESs in commercial MEC
  • Secure service selection for commercial MEC
  • Secure service composition for commercial MEC
  • Secure service recommendation for commercial MEC
  • Attack analysis for commercial MEC
  • Protocols and architecture design for commercial MEC
  • Applications for securing commercial services in MEC

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 3664986
  • - Research Article

Secure Analysis for IIOT Systems Using Hyperchaotic Image Encryption

Haini Zeng | Qiping Zou
  • Special Issue
  • - Volume 2022
  • - Article ID 4490757
  • - Research Article

Research on IoT Forensics System Based on Blockchain Technology

Guangjun Liang | Jianfang Xin | ... | Xiangmin Guo
  • Special Issue
  • - Volume 2022
  • - Article ID 1557233
  • - Research Article

An Improved Secure Public Cloud Auditing Scheme in Edge Computing

Zhengge Yi | Lixian Wei | ... | Ruifeng Li
  • Special Issue
  • - Volume 2022
  • - Article ID 8146656
  • - Research Article

Research on Automatic Cargo Recognition in Smart City Environment

Lanlan Yin | Feng Mo | ... | Zhixun Liang
  • Special Issue
  • - Volume 2022
  • - Article ID 4967775
  • - Research Article

A Novel Self-Adaptive Mixed-Variable Multiobjective Ant Colony Optimization Algorithm in Mobile Edge Computing

Yiguang Gong | Weixue Wang | Siqi Gong
  • Special Issue
  • - Volume 2022
  • - Article ID 1870779
  • - Research Article

A Lightweight Data Integrity Verification with Data Dynamics for Mobile Edge Computing

Haiyan Wang | Yi Lin | Fu Xiao
  • Special Issue
  • - Volume 2022
  • - Article ID 1615596
  • - Research Article

A Knowledge Representation Method for Question Answering Service in Mobile Edge Computing Environment

Rong Qian | Xia Hou
  • Special Issue
  • - Volume 2022
  • - Article ID 5019584
  • - Research Article

Towards Optimal Resources Allocation in Cloud Manufacturing: New Task Decomposition Strategy and Service Composition Model

Zhou Fang | Qilin Wu | Dashuai Guan
  • Special Issue
  • - Volume 2022
  • - Article ID 4827956
  • - Research Article

Game-Based Channel Selection for UAV Services in Mobile Edge Computing

Y. Chen | H. Xing | ... | J. Huang
  • Special Issue
  • - Volume 2022
  • - Article ID 8032726
  • - Research Article

Invoice Detection and Recognition System Based on Deep Learning

Xunfeng Yao | Hao Sun | ... | Weichao Lu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.