Security Constraints for Placement of Latency Sensitive 5G MEC Applications

2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)(2022)

引用 1|浏览5
暂无评分
摘要
Multi-access Edge Computing (MEC) is one of the key enablers in 5G, offering to external parties computing capabilities very close to the end users. To attain this objective, the 5G operator needs to provide distributed computing infrastructure tightly integrated with its network. In this paper, we propose a model for MEC infrastructure and MEC applications together with the definition of the problem of optimal application placement taking into account various constraints including security imposed by technical and business conditions. Data models for virtualized MEC infrastructure based on virtual machines and MEC standardization are proposed. Furthermore, the implementation of the proposed data models for MEC applications orchestration on the OpenStack platform is presented.
更多
查看译文
关键词
5G,Multi-access Edge Computing (MEC),MEC application placement,MEC Orchestrator
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要