Mobile edge computing for internet of things (IoT): security and privacy issues

Nowadays, the masonry for environment-friendly and protected network structure designs, for example, the Internet of Things and gigantic data analytics are increasing at a faster pace compared to an earlier state. Mobile edge computing for an Internet of Things widget is information processing that...

Full description

Saved in:
Bibliographic Details
Main Authors: Rahman, Atiqur (Author), Wu, Guangfu (Author), Liton, Ali Md (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2020-06-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02403 am a22003133u 4500
001 ijeecs20767_13833
042 |a dc 
100 1 0 |a Rahman, Atiqur  |e author 
100 1 0 |e contributor 
700 1 0 |a Wu, Guangfu  |e author 
700 1 0 |a Liton, Ali Md  |e author 
245 0 0 |a Mobile edge computing for internet of things (IoT): security and privacy issues 
260 |b Institute of Advanced Engineering and Science,   |c 2020-06-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/20767 
520 |a Nowadays, the masonry for environment-friendly and protected network structure designs, for example, the Internet of Things and gigantic data analytics are increasing at a faster pace compared to an earlier state. Mobile edge computing for an Internet of Things widget is information processing that is achieved at or close to the collectors of information in an Internet of Things system. Herein, we are proposing to temporarily evaluation the concepts, features, protection, and privacy applications of Internet of Things authorized mobile edge computing with its data protection view in our data-driven globe. We focus on illuminating one of kind components that need to be taken into consideration whilst creating a scalable, consistent, impenetrable and disseminated mobile edge computing structure. We also sum up the fundamental ideas regarding security threat alleviation strategies. After that, we walk around the existing challenges and opportunities in the area of mobile edge computing. In conclusion, we analyze a case study, in which a security protection mechanism can be hardened to lift out everyday jobs. 
540 |a Copyright (c) 2020 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690
690 |a Internet of things (IoT); Security; Privacy; Mobile edge computing 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 18, No 3: June 2020; 1486-1493 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v18.i3 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/20767/13833 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/20767/13833  |z Get fulltext