Mobile Edge Computing: A Survey

Mobile edge computing (MEC) is an emergent architecture where cloud computing services are extended to the edge of networks leveraging mobile base stations. As a promising edge technology, it can be applied to mobile, wireless, and wireline scenarios, using software and hardware platforms, located at the network edge in the vicinity of end-users. MEC provides seamless integration of multiple application service providers and vendors toward mobile subscribers, enterprises, and other vertical segments. It is an important component in the 5G architecture which supports variety of innovative applications and services where ultralow latency is required. This paper is aimed to present a comprehensive survey of relevant research and technological developments in the area of MEC. It provides the definition of MEC, its advantages, architectures, and application areas; where we in particular highlight related research and future directions. Finally, security and privacy issues and related existing solutions are also discussed.

[1]  Hakima Chaouchi,et al.  Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing , 2016, Mob. Inf. Syst..

[2]  Mohamed N. El-Derini,et al.  A cloudlet architecture using mobile devices , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).

[3]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[4]  Rajkumar Buyya,et al.  Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges , 2015, J. Netw. Comput. Appl..

[5]  Ivan Stojmenovic,et al.  An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..

[6]  Tetsutaro Uehara,et al.  Fog Computing: Issues and Challenges in Security and Forensics , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[7]  Minho Jo,et al.  Recovery for overloaded mobile edge computing , 2017, Future Gener. Comput. Syst..

[8]  Steve Chi-Yin Yuen,et al.  Augmented Reality: An Overview and Five Directions for AR in Education , 2011 .

[9]  Pezhman Sheinidashtegol,et al.  Performance Metrics of Local Cloud Computing Architectures , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[10]  Claudia Linnhoff-Popien,et al.  ME-VoLTE: Network functions for energy-efficient video transcoding at the mobile edge , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.

[11]  Sergio Barbarossa,et al.  Joint Optimization of Radio and Computational Resources for Multicell Mobile-Edge Computing , 2014, IEEE Transactions on Signal and Information Processing over Networks.

[12]  Andy Cockburn,et al.  User-defined gestures for augmented reality , 2013, INTERACT.

[13]  Ke Zhang,et al.  Delay constrained offloading for Mobile Edge Computing in cloud-enabled vehicular networks , 2016, 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM).

[14]  Jörg Schwenk,et al.  All your clouds are belong to us: security analysis of cloud management interfaces , 2011, CCSW '11.

[15]  Mahmoud Al-Ayyoub,et al.  The future of mobile cloud computing: Integrating cloudlets and Mobile Edge Computing , 2016, 2016 23rd International Conference on Telecommunications (ICT).

[16]  Songqing Chen,et al.  FAST: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation , 2015, 2015 IEEE International Conference on Networking, Architecture and Storage (NAS).

[17]  Ghassan O. Karame,et al.  Access control for SDN controllers , 2014, HotSDN.

[18]  Frank Eliassen,et al.  From IoT big data to IoT big services , 2017, SAC.

[19]  Tian Yu,et al.  Adaptive Computation Offloading from Mobile Devices into the Cloud , 2012, 2012 IEEE 10th International Symposium on Parallel and Distributed Processing with Applications.

[20]  David Lillethun,et al.  Mobile fog: a programming model for large-scale applications on the internet of things , 2013, MCC '13.

[21]  Xiaohui Liang,et al.  Ieee Transactions on Parallel and Distributed Systems Eppa: an Efficient and Privacy-preserving Aggregation Scheme for Secure Smart Grid Communications , 2022 .

[22]  Ejaz Ahmed,et al.  A review on remote data auditing in single cloud server: Taxonomy and open issues , 2014, J. Netw. Comput. Appl..

[23]  Rajkumar Buyya,et al.  Internet of Things: Principles and Paradigms , 2016 .

[24]  Prakash Ranganathan,et al.  A survey on smart grid metering infrastructures: Threats and solutions , 2015, 2015 IEEE International Conference on Electro/Information Technology (EIT).

[25]  Samia Bouzefrane,et al.  Cloudlets Authentication in NFC-Based Mobile Computing , 2014, 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

[26]  Ching-Hsien Hsu,et al.  Case of ARM emulation optimization for offloading mechanisms in Mobile Cloud Computing , 2017, Future Gener. Comput. Syst..

[27]  Ronald T. Azuma W Enabling Technologies Yohan Baillot Nrl Virtual Reality Lab/itt Advanced Engineering Recent Advances in Augmented Reality , 2001 .

[28]  Noriyuki Takahashi,et al.  Analysis of Process Assignment in Multi-tier mobile Cloud Computing and Application to Edge Accelerated Web Browsing , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

[29]  Ejaz Ahmed,et al.  A survey on mobile edge computing , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).

[30]  Lifeng Sun,et al.  A Survey of Cloudlet Based Mobile Computing , 2015, 2015 International Conference on Cloud Computing and Big Data (CCBD).

[31]  Feng Xia,et al.  Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges , 2015, J. Netw. Comput. Appl..

[32]  Qun Li,et al.  Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.

[33]  Bharat K. Bhargava,et al.  A Survey of Computation Offloading for Mobile Systems , 2012, Mobile Networks and Applications.

[34]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[35]  Sherali Zeadally,et al.  Vehicular delay-tolerant networks for smart grid data management using mobile edge computing , 2016, IEEE Communications Magazine.

[36]  Patrick D. McDaniel,et al.  Protecting consumer privacy from electric load monitoring , 2011, CCS '11.

[37]  Toni Janevski,et al.  5G and the Fog — Survey of related technologies and research directions , 2016, 2016 18th Mediterranean Electrotechnical Conference (MELECON).

[38]  Imad Aad,et al.  The Mobile Data Challenge: Big Data for Mobile Computing Research , 2012 .

[39]  Hwee Pink Tan,et al.  Mobile big data analytics using deep learning and apache spark , 2016, IEEE Network.

[40]  Melnned M. Kantardzic Big Data Analytics , 2013, Lecture Notes in Computer Science.

[41]  Ejaz Ahmed,et al.  Multi-objective optimization model for seamless application execution in mobile cloud computing , 2013, 2013 5th International Conference on Information and Communication Technologies.

[42]  Guofei Gu,et al.  Attacking software-defined networks: a first feasibility study , 2013, HotSDN '13.

[43]  Raj Jain,et al.  Network virtualization and software defined networking for cloud computing: a survey , 2013, IEEE Communications Magazine.

[44]  Marco Conti,et al.  Mobile edge clouds for Information-Centric IoT services , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).

[45]  Yonggang Wen,et al.  Cloud radio access network (C-RAN): a primer , 2015, IEEE Network.

[46]  Bo Sheng,et al.  A Timing-Based Scheme for Rogue AP Detection , 2011, IEEE Transactions on Parallel and Distributed Systems.

[47]  Songqing Chen,et al.  Help your mobile applications with fog computing , 2015, 2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking - Workshops (SECON Workshops).

[48]  Juergen Rochol,et al.  Managing mobile cloud computing considering objective and subjective perspectives , 2015, Comput. Networks.

[49]  Talicia Tarver,et al.  HEART DISEASE AND STROKE STATISTICS–2014 UPDATE: A REPORT FROM THE AMERICAN HEART ASSOCIATION , 2014 .

[50]  Mahmoud Al-Ayyoub,et al.  SDMEC: Software Defined System for Mobile Edge Computing , 2016, 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW).

[51]  Zhisheng Niu,et al.  A Cooperative Scheduling Scheme of Local Cloud and Internet Cloud for Delay-Aware Mobile Cloud Computing , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[52]  Mohsen Guizani,et al.  Replisom: Disciplined Tiny Memory Replication for Massive IoT Devices in LTE Edge Cloud , 2016, IEEE Internet of Things Journal.

[53]  Qun Li,et al.  Fog Computing: Platform and Applications , 2015, 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).

[54]  Guochu Shou,et al.  Mobile Edge Computing: Progress and Challenges , 2016, 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud).

[55]  Mubashir Husain Rehmani,et al.  Mobile Edge Computing: Opportunities, solutions, and challenges , 2017, Future Gener. Comput. Syst..

[56]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[57]  Rose Qingyang Hu,et al.  Heterogeneous Cellular Networks: Hu/Heterogeneous , 2013 .

[58]  Giuseppe Carella,et al.  Efficient Exploitation of Mobile Edge Computing for Virtualized 5G in EPC Architectures , 2016, 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud).

[59]  Vladimir Stantchev,et al.  Smart Items, Fog and Cloud Computing as Enablers of Servitization in Healthcare , 2015 .

[60]  Bijayalaxmi Panda,et al.  Big data and ICT applications: A study , 2016, ICTCS '16.

[61]  Kang Kai,et al.  Fog computing for vehicular Ad-hoc networks: paradigms, scenarios, and issues , 2016 .

[62]  Qun Li,et al.  A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.

[63]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[64]  Paramvir Bahl,et al.  Help for the Mentally Challenged , 2022 .

[65]  Maria Ebling,et al.  An open ecosystem for mobile-cloud convergence , 2015, IEEE Communications Magazine.

[66]  M. Roizen Forecasting the Future of Cardiovascular Disease in the United States: A Policy Statement From the American Heart Association , 2012 .

[67]  Xiaohua Jia,et al.  Data storage auditing service in cloud computing: challenges, methods and opportunities , 2011, World Wide Web.

[68]  Hubertus Feussner,et al.  Enabling Real-Time Context-Aware Collaboration through 5G and Mobile Edge Computing , 2015, 2015 12th International Conference on Information Technology - New Generations.

[69]  Winfried Lamersdorf,et al.  Computing at the Mobile Edge: Designing Elastic Android Applications for Computation Offloading , 2015, 2015 8th IFIP Wireless and Mobile Networking Conference (WMNC).

[70]  Khaled A. Harras,et al.  Femto Clouds: Leveraging Mobile Devices to Provide Cloud Service at the Edge , 2015, 2015 IEEE 8th International Conference on Cloud Computing.

[71]  S Prathima,et al.  MOBILE CLOUD COMPUTING , 2018 .

[72]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[73]  Wei Gao Opportunistic Peer-to-Peer Mobile Cloud Computing at the Tactical Edge , 2014, 2014 IEEE Military Communications Conference.

[74]  Levente Buttyán,et al.  A survey of security issues in hardware virtualization , 2013, CSUR.

[75]  Yuan Zhao,et al.  When mobile terminals meet the cloud: computation offloading as the bridge , 2013, IEEE Network.

[76]  Matti Latva-aho,et al.  5GTN: A test network for 5G application development and testing , 2016, 2016 European Conference on Networks and Communications (EuCNC).

[77]  Sachchidanand Singh,et al.  Big Data analytics , 2012 .

[78]  Pawel Kulakowski,et al.  Performance study of wireless sensor and actuator networks in forest fire scenarios , 2013, Int. J. Commun. Syst..

[79]  Tansu Alpcan,et al.  Fog Computing May Help to Save Energy in Cloud Computing , 2016, IEEE Journal on Selected Areas in Communications.

[80]  Frank Eliassen,et al.  Poster Abstract: Data-centric IoT Services Provisioning in Fog-Cloud Computing Systems , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[81]  Festim Halili,et al.  Mobile Cloud Computing: A new way of Cloud Computing , 2017 .

[82]  Mohammed A. Qadeer,et al.  4G as a Next Generation Wireless Network , 2009, 2009 International Conference on Future Computer and Communication.

[83]  Rajkumar Buyya,et al.  Fog Computing: Principles, Architectures, and Applications , 2016, ArXiv.

[84]  Tom H. Luan,et al.  Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.

[85]  Rajkumar Buyya,et al.  Network-centric performance analysis of runtime application migration in mobile cloud computing , 2015, Simul. Model. Pract. Theory.

[86]  Thomas Olsson,et al.  Online user survey on current mobile augmented reality applications , 2011, 2011 10th IEEE International Symposium on Mixed and Augmented Reality.

[87]  Wenzhong Li,et al.  Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing , 2015, IEEE/ACM Transactions on Networking.

[88]  Tim Verbelen,et al.  Cloudlets: bringing the cloud to the mobile user , 2012, MCS '12.

[89]  Myung J. Lee,et al.  Adaptive Multi-Resource Allocation for Cloudlet-Based Mobile Cloud Computing System , 2016, IEEE Transactions on Mobile Computing.

[90]  Fengyuan Xu,et al.  MobiShare: Flexible privacy-preserving location sharing in mobile online social networks , 2012, 2012 Proceedings IEEE INFOCOM.

[91]  Chun-Kwan Park Performance for Radio Access Network in mobile backhaul network , 2012 .

[92]  Michael Till Beck,et al.  Mobile Edge Computing: A Taxonomy , 2014 .

[93]  Jeremy Hilton,et al.  A Reference Model of Information Assurance & Security , 2013, 2013 International Conference on Availability, Reliability and Security.

[94]  Cong Wang,et al.  Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.

[95]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[96]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[97]  Yung-Hsiang Lu,et al.  Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.

[98]  Christian Bonnet,et al.  Fog Computing architecture to enable consumer centric Internet of Things services , 2015, 2015 International Symposium on Consumer Electronics (ISCE).

[99]  Rajkumar Buyya,et al.  Fog Computing: Principals, Architectures, and Applications , 2016 .