Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-4143
Online ISSN:
0976-4151


  About JISR
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)

 

 
Journal of Information Security Research

A Framework for Interfaces of Trust and Security in the Mobile Edge Computing
Evelina Pencheva, Ivaylo Atanasov, Pencho Kolev, Miroslav Slavov
Technical University of Sofia 8 Kl. Ohridski Blvd, Sofia 1000 Bulgaria., Technical University of Gabrovo 4 Hadji Dimitar Gabrovo 5300, Bulgaria {pkpen@tugab.bg; miroslav)slavov@gmail.com}
Abstract: In order to enhance the network flexibility and decrease the time to market new services, mobile edge computing has been developed. In this area, cloud capabilities are increased in the radio networks. We have developed a framework of web service for trust and security management. The new web service permit MEC application registration and finding new services and initiating service agreement and also to control the internal load management.
Keywords: Mobile Edge Computing, Infrastructure Services, Web Services, Service Oriented Architecture, Authentication A Framework for Interfaces of Trust and Security in the Mobile Edge Computing
DOI:https://doi.org/10.6025/jisr/2020/11/4/105-112
Full_Text   PDF 363 KB   Download:   243  times
References:

[1] Chen, Y., Ruchenbusch, L. (2016). Mobile Edge Computing: Brings the Value Back to Networks, IEEE Software Defined Networks, Newsletter, March 2016, Available at: http://sdn.ieee.org/newsletter/march-2016/mobile-edgecomputing-bringthe- values-back-to-networks
[2] Roman, R., Lopez, J., Mambo, M. (2016). Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges”, Future Generation Computer Systems, 2016, Available at: https://arxiv.org/pdf/1602.00484.pdf
[3] Beck, M. T., Feld, S., Linnhhoff-Popien, C., Pützschler, U. (2016). Mobile Edge Computing, Informatik-Spektrum, vol. 39, issue 2, pp. 108-114, 2016.
[4] Sarria, D., Park, D., Jo, M. (2016). Recovery for Overloaded Mobile Edge Computing, Future Generation Computer Systems, 2016, http://dx.doi.org/10.10.2016/j.future.2016.06.024
[5] Beck, M., Werner, M., Feld, S., Schimper, T. (2014). Mobile Edge Computing: A Taxonomy, 2014, The Sixth International Conference on Advances in Future Internet, IARIA, Available at:http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.670.9418&rep=rep1&type=pdf
[6] Ahmed, A., Ahmed, E. (2016). A Survey on Mobile Edge Computing, In: 10th IEEE International Conference on Intelligent Systems and Control (ISCO 2016), 2016, p 1-8.
[7] ETSI GS MEC 003, Mobile Edge Computing (MEC); Framework and Reference Architecture, v1.1.1, 2016. [8] ETSI GS MEC 002 Mobile Edge Computing (MEC); Technical Requirements, v1.1.1, 2016.
[9] Nordbotten, N. A. (2009). XML and Web Services Security Standards, in IEEE Communications Surveys & Tutorials, 11 (3), p 4-21, 3rd Quarter 2009.
[10] Cheong, C. P., Chatwin, C., Young, R. (2011). A New Secure Token for Enhancing Web Service Security, 2011 IEEE International Conference on Computer Science and Automation Engineering, Shanghai, 2011, p 45-48.


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info