Privacy-Aware Access Protocols for MEC Applications in 5G
نویسندگان
چکیده
Multi-access edge computing (MEC) is one of the emerging key technologies in fifth generation (5G) mobile networks, providing reduced end-to-end latency for applications and load transport network. This paper proposes mechanisms to enhance user privacy MEC within 5G. We consider a basic usage scenario, where accesses an application hosted platform via radio access network operator (MNO). First, we create system model based on this scenario. Second, define adversary give list requirements model. also analyze impact when some parties our share information that not strictly needed service. Third, introduce privacy-aware protocol against requirements.
منابع مشابه
MEC-aware Cell Association for 5G Heterogeneous Networks
The need for efficient use of network resources is continuously increasing with the grow of traffic demand, however, current mobile systems have been planned and deployed so far with the mere aim of enhancing radio coverage and capacity. Unfortunately, this approach is not sustainable anymore, as 5G communication systems will have to cope with huge amounts of traffic, heterogeneous in terms of ...
متن کاملLoad & backhaul aware decoupled downlink/uplink access in 5G systems
Until the 4 Generation (4G) cellular 3GPP systems, a user equipment’s (UE) cell association has been based on the downlink received power from the strongest base station. Recent work has shown that – with an increasing degree of heterogeneity in emerging 5G systems – such an approach is dramatically suboptimal, advocating for an independent association of the downlink and uplink where the downl...
متن کاملPrivacy-aware access control in XML databases
With the growing use of XML for data transfer and data storage across the web, securing XML documents has become an important issue. The XML privacy and data access control issues are especially significant in XML data repositories because they typically store large collections of highly sensitive business data, health information, etc. Protecting privacy by only restricting access to individua...
متن کاملA Conceptual Privacy Framework for Privacy-aware Iot Health Applications
Internet of things (IoT) is intensely gaining reputation due to its necessity and efficiency in the computer realm. The support of wireless connectivity as well as the emergence of gadgets alleviates its usage essentially in governing systems in various fields. Though these systems are ubiquitous, pervasive and seamless, an issue concerning consumers’ privacy remains debatable. This is most evi...
متن کاملPrivacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Network
سال: 2022
ISSN: ['2673-8732']
DOI: https://doi.org/10.3390/network2020014