| Literature DB >> 30249043 |
Francisco José Mora-Gimeno1, Higinio Mora-Mora2, Diego Marcos-Jorquera3, Bruno Volckaert4.
Abstract
Current mobile devices need to run applications with high computational demands and critical response times. The mobile edge computing (MEC) paradigm was developed to improve the performance of these devices. This new computation architecture allows for the mobile devices to execute applications on fog nodes at the network edge; this process is called data processing offloading. This article presents a security model for the externalization of application execution in multi-tier MEC environments. The principal novelty of this study is that the model is able to modify the required security level in each tier of the distributed architecture as a function of the degree of trust associated with that tier. The basic idea is that a higher degree of trust requires a lower level of security, and vice versa. A formal framework is introduced that represents the general environment of application execution in distributed MEC architectures. An architecture is proposed that allows for deployment of the model in production environments and is implemented for evaluation purposes. The results show that the security model can be applied in multi-tier MEC architectures and that the model produces a minimal overhead, especially for computationally intensive applications.Entities:
Keywords: data processing offloading; mobile edge computing; multi-tier architectures; security models
Year: 2018 PMID: 30249043 PMCID: PMC6210598 DOI: 10.3390/s18103211
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Use case of the secure MEC model based on the degree of trust.
Figure 2Classical three-tier MEC architecture.
Figure 3System architecture for a multi-tier MEC paradigm deployment.
Figure 4Overhead for each security level.
Figure 5Overhead percentage in intensive applications.
Figure 6Overhead percentage in applications that are intensive only in terms of computational cost.
Figure 7Overhead percentage in three-tier MEC architectures.
Figure 8Security of the proposed model against common attacks.