Secure Deployment of Commercial Services in Mobile Edge Computing 2021
1Nanjing University of Information Science and Technology, Nanjing, China
2Macquarie University, Sydney, Australia
3Brandon University, Brandon, Canada
4Norwegian University of Science & Technology, Aalesund, Norway
5Nanjing University, Nanjing, China
Secure Deployment of Commercial Services in Mobile Edge Computing 2021
Description
Currently, mobile edge computing (MEC) is one of the most popular techniques used to respond to real-time services from a wide range of mobile terminals. Despite these terminals, commercial service providers (CSPs), such as video content providers, can also benefit from low-latency edge resources to provide their users with more efficient service acquisition, thereby improving the quality of experience (QoE).
Generally, public telecommunication operators construct edge servers (ESs), and each ES is collocated with a base station in a 5G network that receives various commercial services from the CSPs. For this new commercial mode in MEC, how to construct the pricing model is an urgent issue for attracting CSPs to accommodate their services in commercial ESs. In addition to this, CSPs have major concerns regarding security and privacy, since the commercial services are often from different organizations. Therefore, establishing effective security and trust mechanisms for the ESs is necessary for the industrial application of MEC.
This Special Issue welcomes theoretical and applied contributions for designing secure and privacy-aware mechanisms and algorithms in the deployment of commercial services in MEC. We welcome both original research and review articles.
Potential topics include but are not limited to the following:
- Secure service deployment framework for commercial MEC
- Privacy-aware service offloading in commercial MEC
- Pricing model design for MEC
- Secure service migration across ESs in commercial MEC
- Secure service selection for commercial MEC
- Secure service composition for commercial MEC
- Secure service recommendation for commercial MEC
- Attack analysis for commercial MEC
- Protocols and architecture design for commercial MEC
- Applications for securing commercial services in MEC