dc.contributor.author |
Foko Sindjoung, Miguel Landry
|
|
dc.contributor.author |
Velempini, Mthulisi
|
|
dc.contributor.author |
Djamegni, Clémentin Tayou
|
|
dc.date.accessioned |
2023-07-14T13:35:01Z |
|
dc.date.available |
2023-07-14T13:35:01Z |
|
dc.date.issued |
2023 |
|
dc.identifier.uri |
http://hdl.handle.net/10386/4255 |
|
dc.description |
Journal article published in the journal of Array 19 (2023) 100304 |
en_US |
dc.description.abstract |
Cloud computing has widely been used for applications that require huge computational and data storage
resources. Unfortunately, with the advent of new technologies such as fifth generation of cellular networks
that provide new applications like IoT, cloud computing presents many limits among which the End-To-End
(E2E) latency is the main challenge. These applications generally degrade scenarios that require low latency.
Mobile Edge Computing (MEC) has been proposed to solve this issue. MEC brings computing and storage
resources from cloud data center to edge data center, closer to end-user equipment to reduce the E2E latency
for request processing. However, MEC is vulnerable to security, data privacy, and authentication that affect
the end-user Quality of Experience (QoE). It is therefore fundamental that these challenges are addressed to
avoid poor user experience due to the lack of security or data privacy. In this paper, we propose a hybrid
cryptographic system that uses the symmetric and asymmetric cryptographic systems, to improve data security,
privacy, and user authentication in a MEC-based network. We show that our proposed scheme is secured by
validating it with the Automated Validation of Internet Security Protocol and Application tool. Simulation
results show that our solution consumes less computing resources. |
en_US |
dc.format.extent |
11 pages |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Elsevier Inc. |
en_US |
dc.relation.requires |
PDF |
en_US |
dc.subject |
Autonomous vehicular network |
en_US |
dc.subject |
Data security and privacy |
en_US |
dc.subject |
Mobile edge computing |
en_US |
dc.subject |
User authentication |
en_US |
dc.subject |
User quality of experience |
en_US |
dc.subject |
Quality of service |
en_US |
dc.subject.lcsh |
Mobile computing |
en_US |
dc.subject.lcsh |
Computer networks |
en_US |
dc.subject.lcsh |
Computer security |
en_US |
dc.subject.lcsh |
RADIUS (Computer network protocol) |
en_US |
dc.title |
A data security and privacy scheme for user quality of experience in a Mobile Edge Computing-based network |
en_US |
dc.type |
Article |
en_US |