Next Article in Journal
Band Ratios Matrix Transformation (BRMT): A Sedimentary Lithology Mapping Approach Using ASTER Satellite Sensor
Next Article in Special Issue
SWIPT-Aware Fog Information Processing: Local Computing vs. Fog Offloading
Previous Article in Journal
Detection of Chloroalkanes by Surface-Enhanced Raman Spectroscopy in Microfluidic Chips
Previous Article in Special Issue
A Distributed and Context-Aware Task Assignment Mechanism for Collaborative Mobile Edge Computing
Article Menu
Issue 10 (October) cover image

Export Article

Open AccessArticle

A Secure Multi-Tier Mobile Edge Computing Model for Data Processing Offloading Based on Degree of Trust

1
Department of Computer Technology and Computation, University of Alicante, 03690 Alicante, Spain
2
Department of Information Technology, Ghent University, 9052 Ghent, Belgium
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(10), 3211; https://doi.org/10.3390/s18103211
Received: 22 August 2018 / Revised: 18 September 2018 / Accepted: 21 September 2018 / Published: 23 September 2018
(This article belongs to the Special Issue New Paradigms in Data Sensing and Processing for Edge Computing)
  |  
PDF [3126 KB, uploaded 23 September 2018]
  |  

Abstract

Current mobile devices need to run applications with high computational demands and critical response times. The mobile edge computing (MEC) paradigm was developed to improve the performance of these devices. This new computation architecture allows for the mobile devices to execute applications on fog nodes at the network edge; this process is called data processing offloading. This article presents a security model for the externalization of application execution in multi-tier MEC environments. The principal novelty of this study is that the model is able to modify the required security level in each tier of the distributed architecture as a function of the degree of trust associated with that tier. The basic idea is that a higher degree of trust requires a lower level of security, and vice versa. A formal framework is introduced that represents the general environment of application execution in distributed MEC architectures. An architecture is proposed that allows for deployment of the model in production environments and is implemented for evaluation purposes. The results show that the security model can be applied in multi-tier MEC architectures and that the model produces a minimal overhead, especially for computationally intensive applications. View Full-Text
Keywords: mobile edge computing; security models; data processing offloading; multi-tier architectures mobile edge computing; security models; data processing offloading; multi-tier architectures
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Mora-Gimeno, F.J.; Mora-Mora, H.; Marcos-Jorquera, D.; Volckaert, B. A Secure Multi-Tier Mobile Edge Computing Model for Data Processing Offloading Based on Degree of Trust. Sensors 2018, 18, 3211.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top