Security and Privacy for Mobile Edge Caching: Challenges and Solutions

Mobile edge caching is a promising technology for the next-generation mobile networks to effectively offer service environment and cloud-storage capabilities at the edge of networks. By exploiting the storage and computing resources at the network edge, mobile edge caching can significantly reduce service latency, decrease network load, and improve user experience. On the other hand, edge caching is subject to a number of threats regarding privacy violation and security breach. In this article, we first introduce the architecture of mobile edge caching, and address the key problems regarding why, where, what, and how to cache. Then, we examine the potential cyber threats, including cache poisoning attacks, cache pollution attacks, cache side-channel attacks, and cache deception attacks, which result in huge concerns about privacy, security, and trust in content placement, content delivery, and content usage for mobile users, respectively. After that, we propose a service-oriented and location-based efficient key distribution protocol (SOLEK) as an example in response to efficient and secure content delivery in mobile edge caching. Finally, we discuss the potential techniques for privacy-preserving content placement, efficient and secure content delivery, and trustful content usage, which are expected to draw more attention and efforts into secure edge caching.

[1]  Zhou Su,et al.  A Secure Content Caching Scheme for Disaster Backup in Fog Computing Enabled Mobile Social Networks , 2018, IEEE Transactions on Industrial Informatics.

[2]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[3]  Dong Liu,et al.  Caching at the wireless edge: design aspects, challenges, and future directions , 2016, IEEE Communications Magazine.

[4]  C. Pandu Rangan,et al.  An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing , 2017, ProvSec.

[5]  Yuanguo Bi,et al.  Catalyzing Cloud-Fog Interoperation in 5G Wireless Networks: An SDN Approach , 2016, IEEE Network.

[6]  Xiaofei Wang,et al.  Cache in the air: exploiting content caching and delivery techniques for 5G systems , 2014, IEEE Communications Magazine.

[7]  Ben Smyth,et al.  CryptoCache: Network caching with confidentiality , 2017, 2017 IEEE International Conference on Communications (ICC).

[8]  Roy Friedman,et al.  Access Strategies for Network Caching , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[9]  Jie Cui,et al.  Secure data sharing scheme for VANETs based on edge computing , 2019, EURASIP Journal on Wireless Communications and Networking.

[10]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[11]  Ying Wang,et al.  An Efficient and Recoverable Data Sharing Mechanism for Edge Storage , 2019, WASA.

[12]  Xiang Chen,et al.  Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.

[13]  Ilyas Alper Karatepe,et al.  Big data caching for networking: moving from cloud to edge , 2016, IEEE Communications Magazine.

[14]  R. Stephenson A and V , 1962, The British journal of ophthalmology.

[15]  Xu Chen,et al.  In-Edge AI: Intelligentizing Mobile Edge Computing, Caching and Communication by Federated Learning , 2018, IEEE Network.