Mobile edge computing for internet of things (IoT): security and privacy issues
Nowadays, the masonry for environment-friendly and protected network structure designs, for example, the Internet of Things and gigantic data analytics are increasing at a faster pace compared to an earlier state. Mobile edge computing for an Internet of Things widget is information processing that...
Saved in:
Main Authors: | , , |
---|---|
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2020-06-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02403 am a22003133u 4500 | ||
---|---|---|---|
001 | ijeecs20767_13833 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Rahman, Atiqur |e author |
100 | 1 | 0 | |e contributor |
700 | 1 | 0 | |a Wu, Guangfu |e author |
700 | 1 | 0 | |a Liton, Ali Md |e author |
245 | 0 | 0 | |a Mobile edge computing for internet of things (IoT): security and privacy issues |
260 | |b Institute of Advanced Engineering and Science, |c 2020-06-01. | ||
500 | |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/20767 | ||
520 | |a Nowadays, the masonry for environment-friendly and protected network structure designs, for example, the Internet of Things and gigantic data analytics are increasing at a faster pace compared to an earlier state. Mobile edge computing for an Internet of Things widget is information processing that is achieved at or close to the collectors of information in an Internet of Things system. Herein, we are proposing to temporarily evaluation the concepts, features, protection, and privacy applications of Internet of Things authorized mobile edge computing with its data protection view in our data-driven globe. We focus on illuminating one of kind components that need to be taken into consideration whilst creating a scalable, consistent, impenetrable and disseminated mobile edge computing structure. We also sum up the fundamental ideas regarding security threat alleviation strategies. After that, we walk around the existing challenges and opportunities in the area of mobile edge computing. In conclusion, we analyze a case study, in which a security protection mechanism can be hardened to lift out everyday jobs. | ||
540 | |a Copyright (c) 2020 Institute of Advanced Engineering and Science | ||
540 | |a http://creativecommons.org/licenses/by-nc/4.0 | ||
546 | |a eng | ||
690 | |||
690 | |a Internet of things (IoT); Security; Privacy; Mobile edge computing | ||
655 | 7 | |a info:eu-repo/semantics/article |2 local | |
655 | 7 | |a info:eu-repo/semantics/publishedVersion |2 local | |
655 | 7 | |2 local | |
786 | 0 | |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 18, No 3: June 2020; 1486-1493 | |
786 | 0 | |n 2502-4760 | |
786 | 0 | |n 2502-4752 | |
786 | 0 | |n 10.11591/ijeecs.v18.i3 | |
787 | 0 | |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/20767/13833 | |
856 | 4 | 1 | |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/20767/13833 |z Get fulltext |