Security and Privacy for Mobile Edge Caching: Challenges and Solutions

Mobile edge caching is a promising technology for next-generation mobile networks to effectively offer service environments and cloud-storage capabilities at the edge of networks. By exploiting the storage and computing resources at the network edge, mobile edge caching can significantly reduce serv...

Full description

Saved in:
Bibliographic Details
Published inIEEE wireless communications Vol. 28; no. 3; pp. 77 - 83
Main Authors Ni, Jianbing, Zhang, Kuan, Vasilakos, Athanasios V.
Format Journal Article
LanguageEnglish
Published New York IEEE 01.06.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Mobile edge caching is a promising technology for next-generation mobile networks to effectively offer service environments and cloud-storage capabilities at the edge of networks. By exploiting the storage and computing resources at the network edge, mobile edge caching can significantly reduce service latency, decrease network load, and improve the user experience. On the other hand, edge caching is subject to a number of threats regarding privacy violations and security breaches. In this article, we first introduce the architecture of mobile edge caching, and address the key problems regarding why, where, what, and how to cache. Then we examine the potential cyber threats, including cache poisoning attacks, cache pollution attacks, cache side-channel attacks, and cache deception attacks, which result in huge concerns about privacy, security, and trust in content placement, content delivery, and content usage for mobile users, respectively. After that, we propose a service-oriented and location-based efficient key distribution protocol (SOLEK) as an example in response to efficient and secure content delivery in mobile edge caching. Finally, we discuss the potential techniques for privacy-preserving content placement, efficient and secure content delivery, and trustful content usage, which are expected to draw more attention and efforts into secure edge caching.
AbstractList Mobile edge caching is a promising technology for next-generation mobile networks to effectively offer service environments and cloud-storage capabilities at the edge of networks. By exploiting the storage and computing resources at the network edge, mobile edge caching can significantly reduce service latency, decrease network load, and improve the user experience. On the other hand, edge caching is subject to a number of threats regarding privacy violations and security breaches. In this article, we first introduce the architecture of mobile edge caching, and address the key problems regarding why, where, what, and how to cache. Then we examine the potential cyber threats, including cache poisoning attacks, cache pollution attacks, cache side-channel attacks, and cache deception attacks, which result in huge concerns about privacy, security, and trust in content placement, content delivery, and content usage for mobile users, respectively. After that, we propose a service-oriented and location-based efficient key distribution protocol (SOLEK) as an example in response to efficient and secure content delivery in mobile edge caching. Finally, we discuss the potential techniques for privacy-preserving content placement, efficient and secure content delivery, and trustful content usage, which are expected to draw more attention and efforts into secure edge caching.
Author Ni, Jianbing
Zhang, Kuan
Vasilakos, Athanasios V.
Author_xml – sequence: 1
  givenname: Jianbing
  surname: Ni
  fullname: Ni, Jianbing
  organization: Queen's University,Canada
– sequence: 2
  givenname: Kuan
  surname: Zhang
  fullname: Zhang, Kuan
  organization: University of Nebraska-Lincoln,USA
– sequence: 3
  givenname: Athanasios V.
  surname: Vasilakos
  fullname: Vasilakos, Athanasios V.
  organization: University of Technology Sydney,Australia
BookMark eNp9kEFLwzAUgINMcJuePXgpeO72kjRp403KpsKGwhSPJU1ft4zazLQV9u_t3PDgwVPe4fveC9-IDGpXIyHXFCaUgpou39MJAJ0wAOBMnZEhFSIJQSbx4DBzGVKWRBdk1DTbHoylkEMyX6HpvG33ga6L4MXbL232Qel8sHS5rTCYFWsMUm02tl7fBelGVxXWa2x--JWruta6urkk56WuGrw6vWPyNp-9po_h4vnhKb1fhIYlqg1LI2PJc6WUBFaCEpEWORQ615BHkvNSxxKV0BEKpuLERBwjCmAKLPI8YcjH5Pa4d-fdZ4dNm21d5-v-ZMaE4EJxFkFPiSNlvGsaj2VmbKsPH229tlVGITsky_pkWV8iOyXrvekfb-fth_b7f4ybo2ER8ZdWHChXwL8BINt2_A
CODEN IWCEAS
CitedBy_id crossref_primary_10_1016_j_future_2022_05_019
crossref_primary_10_1016_j_future_2022_09_010
crossref_primary_10_26599_TST_2023_9010051
crossref_primary_10_1109_JIOT_2021_3074081
crossref_primary_10_1109_TITS_2023_3274307
crossref_primary_10_1109_JIOT_2022_3212464
crossref_primary_10_3390_s21010023
crossref_primary_10_3390_s23187775
crossref_primary_10_1109_TC_2024_3355759
crossref_primary_10_1145_3706630
crossref_primary_10_1186_s40537_023_00712_9
crossref_primary_10_1016_j_iot_2023_100690
crossref_primary_10_3390_s24051660
crossref_primary_10_1109_TNSM_2021_3136547
crossref_primary_10_1109_TNSM_2024_3383239
crossref_primary_10_1109_TWC_2023_3248266
crossref_primary_10_1145_3529753
crossref_primary_10_1007_s11227_021_03806_4
crossref_primary_10_1109_TCE_2023_3345861
crossref_primary_10_1002_int_23036
crossref_primary_10_1007_s10586_024_04844_2
crossref_primary_10_1016_j_optlastec_2023_109543
crossref_primary_10_1109_TDSC_2021_3124546
crossref_primary_10_1007_s10462_022_10143_2
crossref_primary_10_3390_s21227507
crossref_primary_10_1016_j_comnet_2023_109654
crossref_primary_10_1109_JIOT_2024_3385446
crossref_primary_10_1109_TDSC_2024_3424448
crossref_primary_10_1109_TII_2021_3097131
crossref_primary_10_1007_s11082_024_06282_1
crossref_primary_10_1109_TCBB_2023_3243932
crossref_primary_10_1016_j_sysarc_2024_103306
crossref_primary_10_1109_COMST_2023_3244674
crossref_primary_10_1109_JIOT_2023_3318862
crossref_primary_10_1109_TCC_2022_3185170
crossref_primary_10_1016_j_telpol_2025_102931
crossref_primary_10_1109_JSAC_2021_3118419
crossref_primary_10_1109_TIFS_2021_3081263
crossref_primary_10_1109_OJCOMS_2024_3356076
crossref_primary_10_1109_TNSM_2021_3131266
crossref_primary_10_1145_3680277
crossref_primary_10_3390_app12031103
crossref_primary_10_3390_s22165945
crossref_primary_10_1109_ACCESS_2022_3184035
crossref_primary_10_1109_TVT_2024_3422499
Cites_doi 10.1109/TII.2018.2849984
10.1109/INFOCOM.2019.8737427
10.1109/MCOM.2014.6736753
10.1109/ICC.2017.7996866
10.1016/j.future.2016.11.031
10.1109/MCOM.2016.7565183
10.1109/MNET.2019.1800286
10.1109/MNET.2017.1600078
10.1109/JPROC.2019.2948302
10.1109/MCOM.2016.7565185
10.1007/978-3-030-23597-0_20
10.1109/MWC.2018.1700291
10.1186/s13638-019-1494-1
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
8FD
F28
FR3
L7M
DOI 10.1109/MWC.001.2000329
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Electronics & Communications Abstracts
Technology Research Database
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Engineering Research Database
Technology Research Database
Advanced Technologies Database with Aerospace
ANTE: Abstracts in New Technology & Engineering
Electronics & Communications Abstracts
DatabaseTitleList
Engineering Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-0687
EndPage 83
ExternalDocumentID 10_1109_MWC_001_2000329
9301390
Genre orig-research
GroupedDBID -~X
0R~
1OL
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
AZLTO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IES
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
RIA
RIE
RNS
TN5
AAYOK
AAYXX
CITATION
RIG
7SP
8FD
F28
FR3
L7M
ID FETCH-LOGICAL-c289t-fc6763b999602f0954a5b0daba0b4633fa76e95a4e52978c43e4100cdedbb82e3
IEDL.DBID RIE
ISSN 1536-1284
IngestDate Sun Jun 29 16:44:20 EDT 2025
Tue Jul 01 01:51:08 EDT 2025
Thu Apr 24 22:56:51 EDT 2025
Wed Aug 27 02:39:32 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c289t-fc6763b999602f0954a5b0daba0b4633fa76e95a4e52978c43e4100cdedbb82e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2553593240
PQPubID 75748
PageCount 7
ParticipantIDs crossref_primary_10_1109_MWC_001_2000329
ieee_primary_9301390
crossref_citationtrail_10_1109_MWC_001_2000329
proquest_journals_2553593240
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-06-01
PublicationDateYYYYMMDD 2021-06-01
PublicationDate_xml – month: 06
  year: 2021
  text: 2021-06-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE wireless communications
PublicationTitleAbbrev WC-M
PublicationYear 2021
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
selvi (ref14) 0
ref11
ref10
ref1
lu (ref7) 0; 108
ref8
ref9
ref4
ref3
ref6
ref5
hu (ref2) 2015; 11
References_xml – start-page: 413
  year: 0
  ident: ref14
  article-title: An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing
  publication-title: Proc ProvSec
– ident: ref12
  doi: 10.1109/TII.2018.2849984
– ident: ref10
  doi: 10.1109/INFOCOM.2019.8737427
– ident: ref5
  doi: 10.1109/MCOM.2014.6736753
– ident: ref11
  doi: 10.1109/ICC.2017.7996866
– ident: ref1
  doi: 10.1016/j.future.2016.11.031
– ident: ref4
  doi: 10.1109/MCOM.2016.7565183
– volume: 11
  start-page: 1
  year: 2015
  ident: ref2
  article-title: Mobile Edge Computing - A Key Technology Towards 5G
  publication-title: ETSI White Paper
– ident: ref9
  doi: 10.1109/MNET.2019.1800286
– ident: ref6
  doi: 10.1109/MNET.2017.1600078
– volume: 108
  start-page: 373
  year: 0
  ident: ref7
  article-title: 5G Vehicle-to-Everything (V2X) Services: Gearing Up for Security and Privacy
  publication-title: Proc IEEE
  doi: 10.1109/JPROC.2019.2948302
– ident: ref3
  doi: 10.1109/MCOM.2016.7565185
– ident: ref15
  doi: 10.1007/978-3-030-23597-0_20
– ident: ref8
  doi: 10.1109/MWC.2018.1700291
– ident: ref13
  doi: 10.1186/s13638-019-1494-1
SSID ssj0017656
Score 2.5573113
Snippet Mobile edge caching is a promising technology for next-generation mobile networks to effectively offer service environments and cloud-storage capabilities at...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 77
SubjectTerms Base stations
Caching
Cloud computing
Computer architecture
Cybersecurity
Jamming
Location based services
Network latency
Next generation networking
Placement
Privacy
Security
Service introduction
Side-channel attacks
User experience
Title Security and Privacy for Mobile Edge Caching: Challenges and Solutions
URI https://ieeexplore.ieee.org/document/9301390
https://www.proquest.com/docview/2553593240
Volume 28
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA61Jz34qmK1Sg4ePLjt7iab7nqTpaUIFUGLvS15zIooW-lD0F9vks2u4gO85ZBAyCST-ZKZ70PoFBKVU9IPPC4ZeFSFwhN-mHsQRmESxnnAhClOHl-z0YReTaNpA53XtTAAYJPPoGua9i9fzeTKPJX1EmICFg3Q1zRwK2u16h-DPrNKrfoAG12ZmDoan8BPeuP71Hw42KoUYmPJzxvISqr88MP2chluoXE1rTKn5Km7WoqufP_G2PjfeW-jTRdl4styW-ygBhS7aOML92ALDW-dch3mhcI388dXLt-wDmHxeCa0q8AD9QA4LXMtL3Baia4sbP_6NW0PTYaDu3TkOVEFT2pstfRyybRLEQbnaJvoAIvySPiKC-4LygjJeZ9BEnEK2lj9WFICNPB9qUAJEYdA9lGzmBVwgDCoiCrOFOGGlQ4YlySnkmuIJHIDddqoWy10Jh3juBG-eM4s8vCTTFvGJNVlzjJtdFYPeCnJNv7u2jLrXHdzS9xGncqSmTuMi0yjJhIlhnnw8PdRR2g9NKkq9nGlg5rL-QqOdayxFCd2k30AUEPPXA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1LTxsxEB7xOEAPPAqI8PShlbhs2NheJ4vEAQWi8AiqVBDcFj9mEWqVVCQBwW_hr_DfsL3OUgE9IvW2B3vl9cyOv_E8PoBvmJqcs3otklpgxA1VkYppHiFNaEobeU0oV5zcORXtc350mVyOwVNZC4OIPvkMq-7Rx_JNTw_dVdl2yhxgiUMK5TE-3FsHrb97uG-l-Z3S1sFZsx0FDoFIW1diEOVa2D9IOVhvl2DxBJeJio1UMlZcMJbLusA0kRzt2uoNzRnyWhxrg0apBkVm3zsOkxZnJLSoDitjFHXhuWGtyXBMNg0eGgfV4nS7c9F0IQ5fB8M8en098zyJyzvL74-z1iw8jzaiyGL5VR0OVFU_vukR-b_u1BzMBBxN9grFn4cx7H6FL391V1yA1s_AzUdk15Aftzd3Uj8QC9JJp6esMSQH5hpJs8gm3SHNEa1M348v7wsX4fxTPmQJJrq9Li4DQZNwI4Vh0vXdQyE1y7mW1glUuXPmKlAdCTbToae6o_b4nXnfKk4zqwkubTALmlCBrXLCn6KdyL-HLji5lsOCSCuwNtKcLJibfmb9QpakrrfiysezNmGqfdY5yU4OT49XYZq6xBx_lbQGE4PbIa5bZDVQG17BCVx9tp68AON_LTs
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+and+Privacy+for+Mobile+Edge+Caching%3A+Challenges+and+Solutions&rft.jtitle=IEEE+wireless+communications&rft.au=Ni%2C+Jianbing&rft.au=Zhang%2C+Kuan&rft.au=Vasilakos%2C+Athanasios+V.&rft.date=2021-06-01&rft.pub=IEEE&rft.issn=1536-1284&rft.volume=28&rft.issue=3&rft.spage=77&rft.epage=83&rft_id=info:doi/10.1109%2FMWC.001.2000329&rft.externalDocID=9301390
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1284&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1284&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1284&client=summon