Architectures, Security Issues, and Usage Scenarios of EC

  • Mian Usman Sattar Beaconhouse National University, Lahore, Pakistan
  • Amna Mubashar Department of Computer Science, Kinnaird College for Women, Lahore, Pakistan.
  • Rimsha Fareed Department of Computer Science, Kinnaird College for Women, Lahore, Pakistan.
  • Muhammad Rizwan Department of Computer Science, Kinnaird College for Women, Lahore, Pakistan.

Abstract

Abstract Views: 80

Demand for the digital media is increasing exponentially due to the data generated with regards to IoT devices, thus for these growing needs certain advancements have been made in various technologies like cloud computing which has transitioned to fog and edge computing. The differences between each technology relate to many factors like security, privacy, Big data issues, bandwidth, and radio access networking. Thus, we have discussed the problems faced by older versions of cloud computing and how Mobile Edge Computing (MEC) helps to overcome most of these problems. MEC is explored where it offers real-time information thus providing benefits to the end-users. The growth of MEC is such that, as discussed further, it is used in normal habitual routines like real-time grocery shopping. This paper explores the various architectures, use cases and security aspects of edge computing.

Downloads

Download data is not yet available.
Published
2021-06-30
How to Cite
Sattar, M. U., Mubashar, A., Fareed, R., & Rizwan, M. (2021). Architectures, Security Issues, and Usage Scenarios of EC . UMT Artificial Intelligence Review, 1(1), 1-1. https://doi.org/10.32350/umtair.11.04
Section
Articles