Architectures, Security Issues, and Usage Scenarios of EC
Abstract
Abstract Views: 80Demand for the digital media is increasing exponentially due to the data generated with regards to IoT devices, thus for these growing needs certain advancements have been made in various technologies like cloud computing which has transitioned to fog and edge computing. The differences between each technology relate to many factors like security, privacy, Big data issues, bandwidth, and radio access networking. Thus, we have discussed the problems faced by older versions of cloud computing and how Mobile Edge Computing (MEC) helps to overcome most of these problems. MEC is explored where it offers real-time information thus providing benefits to the end-users. The growth of MEC is such that, as discussed further, it is used in normal habitual routines like real-time grocery shopping. This paper explores the various architectures, use cases and security aspects of edge computing.
Downloads
UMT-AIR follow an open-access publishing policy and full text of all published articles is available free, immediately upon publication of an issue. The journal’s contents are published and distributed under the terms of the Creative Commons Attribution 4.0 International (CC-BY 4.0) license. Thus, the work submitted to the journal implies that it is original, unpublished work of the authors (neither published previously nor accepted/under consideration for publication elsewhere). On acceptance of a manuscript for publication, a corresponding author on the behalf of all co-authors of the manuscript will sign and submit a completed the Copyright and Author Consent Form.