2020
DOI: 10.1155/2020/8820507
|View full text |Cite
|
Sign up to set email alerts
|

Falcon: A Blockchain-Based Edge Service Migration Framework in MEC

Abstract: Driven by advanced 5G cellular systems, mobile edge computing (MEC) has emerged as a promising technology that can meet the energy efficiency and latency requirements of IoT applications. Edge service migration in the MEC environment plays an important role in ensuring user service quality and enhancing terminal computing capabilities. Application services on the edge side should be migrated from different edge servers to edge nodes closer to users, so that services follow users and ensure high-quality service… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 42 publications
0
5
0
Order By: Relevance
“…In heterogeneous environments like MEC, the infrastructure needs to examine the pertinent aspects of access requests instead of assuming trust based on a point-in-time assurance, that is, admission control or network location. Trust management for MEC introduces challenges as identified in [7,[26][27][28][29]. In the ZTS approach, the security posture of applications, users, and UE [11,24] will be continually reassessed.…”
Section: Zero-trust Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…In heterogeneous environments like MEC, the infrastructure needs to examine the pertinent aspects of access requests instead of assuming trust based on a point-in-time assurance, that is, admission control or network location. Trust management for MEC introduces challenges as identified in [7,[26][27][28][29]. In the ZTS approach, the security posture of applications, users, and UE [11,24] will be continually reassessed.…”
Section: Zero-trust Securitymentioning
confidence: 99%
“…Several authors [3][4][5][6][7] have proposed a zero-trust approach to security in MEC. Full implementation of Zero-Trust Security (ZTS) would be a major undertaking, and the implementation could be staged to reduce complexity.…”
Section: Introductionmentioning
confidence: 99%
“…18 Zhang et al propose a Blockchain-based architecture to ensure security in mobile edge computing (MEC), which is used with 5G technology to control edge-to-device latency and energy efficiency in its proposed system. 19 Zhao et al proposes to securely store VM measurement data, which is very important in integrity assessment and decision-making, in the IaaS cloud, using the proposed two-layer Blockchain framework. 20 There are many studies that have taken advantage of blockchain, one of the trending topics of recent years, to move from a central controller to a distributed architecture that does not require any authority.…”
Section: Related Workmentioning
confidence: 99%
“…MEC is defined as providing IT service environment and cloud computing capability at the edge of mobile network [1][2][3][4][5][6][7][8][9]. In the view of the service providers, the network is actually divided into three parts: wireless access network, mobile core network, and application network.…”
Section: Introductionmentioning
confidence: 99%