Architectures, Security Issues, and Usage Scenarios of EC

M. Sattar, Amna Mubashar, Rimsha Fareed, Muhammad Rizwan
{"title":"Architectures, Security Issues, and Usage Scenarios of EC","authors":"M. Sattar, Amna Mubashar, Rimsha Fareed, Muhammad Rizwan","doi":"10.32350/umtair.11.04","DOIUrl":null,"url":null,"abstract":"Demand for the digital media is increasing exponentially due to the data generated with regards to IoT devices, thus for these growing needs certain advancements have been made in various technologies like cloud computing which has transitioned to fog and edge computing. The differences between each technology relate to many factors like security, privacy, Big data issues, bandwidth, and radio access networking. Thus, we have discussed the problems faced by older versions of cloud computing and how Mobile Edge Computing (MEC) helps to overcome most of these problems. MEC is explored where it offers real-time information thus providing benefits to the end-users. The growth of MEC is such that, as discussed further, it is used in normal habitual routines like real-time grocery shopping. This paper explores the various architectures, use cases and security aspects of edge computing.","PeriodicalId":198719,"journal":{"name":"UMT Artificial Intelligence Review","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"UMT Artificial Intelligence Review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32350/umtair.11.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Demand for the digital media is increasing exponentially due to the data generated with regards to IoT devices, thus for these growing needs certain advancements have been made in various technologies like cloud computing which has transitioned to fog and edge computing. The differences between each technology relate to many factors like security, privacy, Big data issues, bandwidth, and radio access networking. Thus, we have discussed the problems faced by older versions of cloud computing and how Mobile Edge Computing (MEC) helps to overcome most of these problems. MEC is explored where it offers real-time information thus providing benefits to the end-users. The growth of MEC is such that, as discussed further, it is used in normal habitual routines like real-time grocery shopping. This paper explores the various architectures, use cases and security aspects of edge computing.
EC的体系结构、安全问题和使用场景
由于物联网设备产生的数据,对数字媒体的需求呈指数级增长,因此对于这些不断增长的需求,在云计算等各种技术方面取得了一定的进步,云计算已经过渡到雾和边缘计算。每种技术之间的差异涉及许多因素,如安全性、隐私、大数据问题、带宽和无线接入网络。因此,我们讨论了旧版本的云计算所面临的问题,以及移动边缘计算(MEC)如何帮助克服大多数这些问题。探索MEC在哪里提供实时信息,从而为最终用户提供好处。正如进一步讨论的那样,MEC的发展是如此迅速,它被用于诸如实时杂货店购物之类的日常习惯。本文探讨了边缘计算的各种架构、用例和安全方面。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信