Privacy-Aware Access Protocols for MEC Applications in 5G

Gizem Akman, Philip Ginzboorg, Valtteri Niemi

    Research output: Contribution to journalArticleScientificpeer-review

    60 Downloads (Pure)

    Abstract

    Multi-access edge computing (MEC) is one of the emerging key technologies in fifth generation (5G) mobile networks, providing reduced end-to-end latency for applications and reduced load in the transport network. This paper proposes mechanisms to enhance user privacy in MEC within 5G. We consider a basic MEC usage scenario, where the user accesses an application hosted in the MEC platform via the radio access network of the mobile network operator (MNO). First, we create a system model based on this scenario. Second, we define the adversary model and give the list of privacy requirements for this system model. We also analyze the impact on user privacy when some of the parties in our model share information that is not strictly needed for providing the service. Third, we introduce a privacy-aware access protocol for the system model and analyze this protocol against the privacy requirements.
    Original languageEnglish
    Pages (from-to)203-224
    Number of pages22
    JournalNetwork
    Volume2
    Issue number2
    DOIs
    Publication statusPublished - 1 Apr 2022
    MoE publication typeA1 Journal article-refereed

    Keywords

    • Computer and information sciences

    Fingerprint

    Dive into the research topics of 'Privacy-Aware Access Protocols for MEC Applications in 5G'. Together they form a unique fingerprint.

    Cite this