Security and Privacy for Mobile Edge Caching: Challenges and Solutions
Mobile edge caching is a promising technology for next-generation mobile networks to effectively offer service environments and cloud-storage capabilities at the edge of networks. By exploiting the storage and computing resources at the network edge, mobile edge caching can significantly reduce serv...
Saved in:
Published in | IEEE wireless communications Vol. 28; no. 3; pp. 77 - 83 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.06.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Mobile edge caching is a promising technology for next-generation mobile networks to effectively offer service environments and cloud-storage capabilities at the edge of networks. By exploiting the storage and computing resources at the network edge, mobile edge caching can significantly reduce service latency, decrease network load, and improve the user experience. On the other hand, edge caching is subject to a number of threats regarding privacy violations and security breaches. In this article, we first introduce the architecture of mobile edge caching, and address the key problems regarding why, where, what, and how to cache. Then we examine the potential cyber threats, including cache poisoning attacks, cache pollution attacks, cache side-channel attacks, and cache deception attacks, which result in huge concerns about privacy, security, and trust in content placement, content delivery, and content usage for mobile users, respectively. After that, we propose a service-oriented and location-based efficient key distribution protocol (SOLEK) as an example in response to efficient and secure content delivery in mobile edge caching. Finally, we discuss the potential techniques for privacy-preserving content placement, efficient and secure content delivery, and trustful content usage, which are expected to draw more attention and efforts into secure edge caching. |
---|---|
AbstractList | Mobile edge caching is a promising technology for next-generation mobile networks to effectively offer service environments and cloud-storage capabilities at the edge of networks. By exploiting the storage and computing resources at the network edge, mobile edge caching can significantly reduce service latency, decrease network load, and improve the user experience. On the other hand, edge caching is subject to a number of threats regarding privacy violations and security breaches. In this article, we first introduce the architecture of mobile edge caching, and address the key problems regarding why, where, what, and how to cache. Then we examine the potential cyber threats, including cache poisoning attacks, cache pollution attacks, cache side-channel attacks, and cache deception attacks, which result in huge concerns about privacy, security, and trust in content placement, content delivery, and content usage for mobile users, respectively. After that, we propose a service-oriented and location-based efficient key distribution protocol (SOLEK) as an example in response to efficient and secure content delivery in mobile edge caching. Finally, we discuss the potential techniques for privacy-preserving content placement, efficient and secure content delivery, and trustful content usage, which are expected to draw more attention and efforts into secure edge caching. |
Author | Ni, Jianbing Zhang, Kuan Vasilakos, Athanasios V. |
Author_xml | – sequence: 1 givenname: Jianbing surname: Ni fullname: Ni, Jianbing organization: Queen's University,Canada – sequence: 2 givenname: Kuan surname: Zhang fullname: Zhang, Kuan organization: University of Nebraska-Lincoln,USA – sequence: 3 givenname: Athanasios V. surname: Vasilakos fullname: Vasilakos, Athanasios V. organization: University of Technology Sydney,Australia |
BookMark | eNp9kEFLwzAUgINMcJuePXgpeO72kjRp403KpsKGwhSPJU1ft4zazLQV9u_t3PDgwVPe4fveC9-IDGpXIyHXFCaUgpou39MJAJ0wAOBMnZEhFSIJQSbx4DBzGVKWRBdk1DTbHoylkEMyX6HpvG33ga6L4MXbL232Qel8sHS5rTCYFWsMUm02tl7fBelGVxXWa2x--JWruta6urkk56WuGrw6vWPyNp-9po_h4vnhKb1fhIYlqg1LI2PJc6WUBFaCEpEWORQ615BHkvNSxxKV0BEKpuLERBwjCmAKLPI8YcjH5Pa4d-fdZ4dNm21d5-v-ZMaE4EJxFkFPiSNlvGsaj2VmbKsPH229tlVGITsky_pkWV8iOyXrvekfb-fth_b7f4ybo2ER8ZdWHChXwL8BINt2_A |
CODEN | IWCEAS |
CitedBy_id | crossref_primary_10_1016_j_future_2022_05_019 crossref_primary_10_1016_j_future_2022_09_010 crossref_primary_10_26599_TST_2023_9010051 crossref_primary_10_1109_JIOT_2021_3074081 crossref_primary_10_1109_TITS_2023_3274307 crossref_primary_10_1109_JIOT_2022_3212464 crossref_primary_10_3390_s21010023 crossref_primary_10_3390_s23187775 crossref_primary_10_1109_TC_2024_3355759 crossref_primary_10_1145_3706630 crossref_primary_10_1186_s40537_023_00712_9 crossref_primary_10_1016_j_iot_2023_100690 crossref_primary_10_3390_s24051660 crossref_primary_10_1109_TNSM_2021_3136547 crossref_primary_10_1109_TNSM_2024_3383239 crossref_primary_10_1109_TWC_2023_3248266 crossref_primary_10_1145_3529753 crossref_primary_10_1007_s11227_021_03806_4 crossref_primary_10_1109_TCE_2023_3345861 crossref_primary_10_1002_int_23036 crossref_primary_10_1007_s10586_024_04844_2 crossref_primary_10_1016_j_optlastec_2023_109543 crossref_primary_10_1109_TDSC_2021_3124546 crossref_primary_10_1007_s10462_022_10143_2 crossref_primary_10_3390_s21227507 crossref_primary_10_1016_j_comnet_2023_109654 crossref_primary_10_1109_JIOT_2024_3385446 crossref_primary_10_1109_TDSC_2024_3424448 crossref_primary_10_1109_TII_2021_3097131 crossref_primary_10_1007_s11082_024_06282_1 crossref_primary_10_1109_TCBB_2023_3243932 crossref_primary_10_1016_j_sysarc_2024_103306 crossref_primary_10_1109_COMST_2023_3244674 crossref_primary_10_1109_JIOT_2023_3318862 crossref_primary_10_1109_TCC_2022_3185170 crossref_primary_10_1016_j_telpol_2025_102931 crossref_primary_10_1109_JSAC_2021_3118419 crossref_primary_10_1109_TIFS_2021_3081263 crossref_primary_10_1109_OJCOMS_2024_3356076 crossref_primary_10_1109_TNSM_2021_3131266 crossref_primary_10_1145_3680277 crossref_primary_10_3390_app12031103 crossref_primary_10_3390_s22165945 crossref_primary_10_1109_ACCESS_2022_3184035 crossref_primary_10_1109_TVT_2024_3422499 |
Cites_doi | 10.1109/TII.2018.2849984 10.1109/INFOCOM.2019.8737427 10.1109/MCOM.2014.6736753 10.1109/ICC.2017.7996866 10.1016/j.future.2016.11.031 10.1109/MCOM.2016.7565183 10.1109/MNET.2019.1800286 10.1109/MNET.2017.1600078 10.1109/JPROC.2019.2948302 10.1109/MCOM.2016.7565185 10.1007/978-3-030-23597-0_20 10.1109/MWC.2018.1700291 10.1186/s13638-019-1494-1 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD F28 FR3 L7M |
DOI | 10.1109/MWC.001.2000329 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Electronics & Communications Abstracts Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Engineering Research Database Technology Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Electronics & Communications Abstracts |
DatabaseTitleList | Engineering Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-0687 |
EndPage | 83 |
ExternalDocumentID | 10_1109_MWC_001_2000329 9301390 |
Genre | orig-research |
GroupedDBID | -~X 0R~ 1OL 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IES IFIPE IPLJI JAVBF LAI M43 O9- OCL RIA RIE RNS TN5 AAYOK AAYXX CITATION RIG 7SP 8FD F28 FR3 L7M |
ID | FETCH-LOGICAL-c289t-fc6763b999602f0954a5b0daba0b4633fa76e95a4e52978c43e4100cdedbb82e3 |
IEDL.DBID | RIE |
ISSN | 1536-1284 |
IngestDate | Sun Jun 29 16:44:20 EDT 2025 Tue Jul 01 01:51:08 EDT 2025 Thu Apr 24 22:56:51 EDT 2025 Wed Aug 27 02:39:32 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c289t-fc6763b999602f0954a5b0daba0b4633fa76e95a4e52978c43e4100cdedbb82e3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2553593240 |
PQPubID | 75748 |
PageCount | 7 |
ParticipantIDs | crossref_primary_10_1109_MWC_001_2000329 ieee_primary_9301390 crossref_citationtrail_10_1109_MWC_001_2000329 proquest_journals_2553593240 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-06-01 |
PublicationDateYYYYMMDD | 2021-06-01 |
PublicationDate_xml | – month: 06 year: 2021 text: 2021-06-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE wireless communications |
PublicationTitleAbbrev | WC-M |
PublicationYear | 2021 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 selvi (ref14) 0 ref11 ref10 ref1 lu (ref7) 0; 108 ref8 ref9 ref4 ref3 ref6 ref5 hu (ref2) 2015; 11 |
References_xml | – start-page: 413 year: 0 ident: ref14 article-title: An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing publication-title: Proc ProvSec – ident: ref12 doi: 10.1109/TII.2018.2849984 – ident: ref10 doi: 10.1109/INFOCOM.2019.8737427 – ident: ref5 doi: 10.1109/MCOM.2014.6736753 – ident: ref11 doi: 10.1109/ICC.2017.7996866 – ident: ref1 doi: 10.1016/j.future.2016.11.031 – ident: ref4 doi: 10.1109/MCOM.2016.7565183 – volume: 11 start-page: 1 year: 2015 ident: ref2 article-title: Mobile Edge Computing - A Key Technology Towards 5G publication-title: ETSI White Paper – ident: ref9 doi: 10.1109/MNET.2019.1800286 – ident: ref6 doi: 10.1109/MNET.2017.1600078 – volume: 108 start-page: 373 year: 0 ident: ref7 article-title: 5G Vehicle-to-Everything (V2X) Services: Gearing Up for Security and Privacy publication-title: Proc IEEE doi: 10.1109/JPROC.2019.2948302 – ident: ref3 doi: 10.1109/MCOM.2016.7565185 – ident: ref15 doi: 10.1007/978-3-030-23597-0_20 – ident: ref8 doi: 10.1109/MWC.2018.1700291 – ident: ref13 doi: 10.1186/s13638-019-1494-1 |
SSID | ssj0017656 |
Score | 2.5573113 |
Snippet | Mobile edge caching is a promising technology for next-generation mobile networks to effectively offer service environments and cloud-storage capabilities at... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 77 |
SubjectTerms | Base stations Caching Cloud computing Computer architecture Cybersecurity Jamming Location based services Network latency Next generation networking Placement Privacy Security Service introduction Side-channel attacks User experience |
Title | Security and Privacy for Mobile Edge Caching: Challenges and Solutions |
URI | https://ieeexplore.ieee.org/document/9301390 https://www.proquest.com/docview/2553593240 |
Volume | 28 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA61Jz34qmK1Sg4ePLjt7iab7nqTpaUIFUGLvS15zIooW-lD0F9vks2u4gO85ZBAyCST-ZKZ70PoFBKVU9IPPC4ZeFSFwhN-mHsQRmESxnnAhClOHl-z0YReTaNpA53XtTAAYJPPoGua9i9fzeTKPJX1EmICFg3Q1zRwK2u16h-DPrNKrfoAG12ZmDoan8BPeuP71Hw42KoUYmPJzxvISqr88MP2chluoXE1rTKn5Km7WoqufP_G2PjfeW-jTRdl4styW-ygBhS7aOML92ALDW-dch3mhcI388dXLt-wDmHxeCa0q8AD9QA4LXMtL3Baia4sbP_6NW0PTYaDu3TkOVEFT2pstfRyybRLEQbnaJvoAIvySPiKC-4LygjJeZ9BEnEK2lj9WFICNPB9qUAJEYdA9lGzmBVwgDCoiCrOFOGGlQ4YlySnkmuIJHIDddqoWy10Jh3juBG-eM4s8vCTTFvGJNVlzjJtdFYPeCnJNv7u2jLrXHdzS9xGncqSmTuMi0yjJhIlhnnw8PdRR2g9NKkq9nGlg5rL-QqOdayxFCd2k30AUEPPXA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1LTxsxEB7xOEAPPAqI8PShlbhs2NheJ4vEAQWi8AiqVBDcFj9mEWqVVCQBwW_hr_DfsL3OUgE9IvW2B3vl9cyOv_E8PoBvmJqcs3otklpgxA1VkYppHiFNaEobeU0oV5zcORXtc350mVyOwVNZC4OIPvkMq-7Rx_JNTw_dVdl2yhxgiUMK5TE-3FsHrb97uG-l-Z3S1sFZsx0FDoFIW1diEOVa2D9IOVhvl2DxBJeJio1UMlZcMJbLusA0kRzt2uoNzRnyWhxrg0apBkVm3zsOkxZnJLSoDitjFHXhuWGtyXBMNg0eGgfV4nS7c9F0IQ5fB8M8en098zyJyzvL74-z1iw8jzaiyGL5VR0OVFU_vukR-b_u1BzMBBxN9grFn4cx7H6FL391V1yA1s_AzUdk15Aftzd3Uj8QC9JJp6esMSQH5hpJs8gm3SHNEa1M348v7wsX4fxTPmQJJrq9Li4DQZNwI4Vh0vXdQyE1y7mW1glUuXPmKlAdCTbToae6o_b4nXnfKk4zqwkubTALmlCBrXLCn6KdyL-HLji5lsOCSCuwNtKcLJibfmb9QpakrrfiysezNmGqfdY5yU4OT49XYZq6xBx_lbQGE4PbIa5bZDVQG17BCVx9tp68AON_LTs |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+and+Privacy+for+Mobile+Edge+Caching%3A+Challenges+and+Solutions&rft.jtitle=IEEE+wireless+communications&rft.au=Ni%2C+Jianbing&rft.au=Zhang%2C+Kuan&rft.au=Vasilakos%2C+Athanasios+V.&rft.date=2021-06-01&rft.pub=IEEE&rft.issn=1536-1284&rft.volume=28&rft.issue=3&rft.spage=77&rft.epage=83&rft_id=info:doi/10.1109%2FMWC.001.2000329&rft.externalDocID=9301390 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1284&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1284&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1284&client=summon |