Security and Communication Networks

Secure Deployment of Commercial Services in Mobile Edge Computing 2021


Publishing date
01 Mar 2022
Status
Published
Submission deadline
05 Nov 2021

Lead Editor

1Nanjing University of Information Science and Technology, Nanjing, China

2Macquarie University, Sydney, Australia

3Brandon University, Brandon, Canada

4Norwegian University of Science & Technology, Aalesund, Norway

5Nanjing University, Nanjing, China


Secure Deployment of Commercial Services in Mobile Edge Computing 2021

Description

Currently, mobile edge computing (MEC) is one of the most popular techniques used to respond to real-time services from a wide range of mobile terminals. Despite these terminals, commercial service providers (CSPs), such as video content providers, can also benefit from low-latency edge resources to provide their users with more efficient service acquisition, thereby improving the quality of experience (QoE).

Generally, public telecommunication operators construct edge servers (ESs), and each ES is collocated with a base station in a 5G network that receives various commercial services from the CSPs. For this new commercial mode in MEC, how to construct the pricing model is an urgent issue for attracting CSPs to accommodate their services in commercial ESs. In addition to this, CSPs have major concerns regarding security and privacy, since the commercial services are often from different organizations. Therefore, establishing effective security and trust mechanisms for the ESs is necessary for the industrial application of MEC.

This Special Issue welcomes theoretical and applied contributions for designing secure and privacy-aware mechanisms and algorithms in the deployment of commercial services in MEC. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Secure service deployment framework for commercial MEC
  • Privacy-aware service offloading in commercial MEC
  • Pricing model design for MEC
  • Secure service migration across ESs in commercial MEC
  • Secure service selection for commercial MEC
  • Secure service composition for commercial MEC
  • Secure service recommendation for commercial MEC
  • Attack analysis for commercial MEC
  • Protocols and architecture design for commercial MEC
  • Applications for securing commercial services in MEC

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 5358873
  • - Research Article

Research on Intelligent Scheduling Mechanism in Edge Network for Industrial Internet of Things

Zhenzhong Zhang | Wei Sun | Yanliang Yu
  • Special Issue
  • - Volume 2021
  • - Article ID 6974757
  • - Research Article

Multicamera Calibration Optimization Method Based on Improved Seagull Algorithm

Shuai Du | Jianyu Wang | Jia Guo
  • Special Issue
  • - Volume 2021
  • - Article ID 5648168
  • - Research Article

Time-Aware Cross-Platform IoT Service Recommendation with Privacy Preservation

Can Zhang | Junhua Wu | ... | Guangshun Li
  • Special Issue
  • - Volume 2021
  • - Article ID 9126833
  • - Research Article

A Graph Optimization-Based Acoustic SLAM Edge Computing System Offering Centimeter-Level Mapping Services with Reflector Recognition Capability

Zou Zhou | Guoli Zhang | ... | Nan Duan
  • Special Issue
  • - Volume 2021
  • - Article ID 7310771
  • - Research Article

Efficient and Secure Cross-Domain Sharing of Blockchain Electronic Medical Records Based on Edge Computing

Yage Cheng | Bei Gong | ... | Xiaofei Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 1951141
  • - Research Article

A Game-Based Scheme for Resource Purchasing and Pricing in MEC for Internet of Things

Yajing Leng | Ming Wang | ... | Jiwei Huang
  • Special Issue
  • - Volume 2021
  • - Article ID 5732300
  • - Research Article

Design of the Wireless Network Hierarchy System of Intelligent City Industrial Data Management Based on SDN Network Architecture

Wenken Tan | Jianmin Hu
  • Special Issue
  • - Volume 2021
  • - Article ID 1737850
  • - Research Article

Coauthorship Network Mining for Scholar Communication and Collaboration Path Recommendation

Weiting Zhao | Zheng Zou | ... | Ashish Kr Luhach
  • Special Issue
  • - Volume 2021
  • - Article ID 6571700
  • - Research Article

pKAS: A Secure Password-Based Key Agreement Scheme for the Edge Cloud

Ping Liu | Syed Hamad Shirazi | ... | Yong Xie
  • Special Issue
  • - Volume 2021
  • - Article ID 1631496
  • - Research Article

Reliability of Hijacked Journal Detection Based on Scientometrics, Altmetric Tools, and Web Informatics: A Case Report Using Google Scholar, Web of Science, and Scopus

Mohammad R. Khosravi | Varun G. Menon
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.