Review Article
A Survey on Secure Deployment of Mobile Services in Edge Computing
Table 3
Challenges and methods of commercial MEC.
| | Challenges | Reference | Method used | Contribution |
| | Risk of user data leakage | [42] | A VLAN based on security architecture | Increase protection to prevent accidental data leakage | | Secure risk of data transmission | [50] | 2D-DWT-1L or 2D-DWT-2L steganography | Enable to hide the confidential patient’s data and transfer data secretly | | Security of terminal device | [51] | A terminal lightweight anonymous security communication scheme | Support access authentication for massive terminal devices |
|
|