ABSTRACT

In recent years, mobile edge computing has been proposed as a new computing paradigm. The mobile user can make a request of service to the mobile edge computing server in the mobile edge computing environment, but it has not been possible to determine whether or not the identity of the mobile user or the mobile edge computing server is legitimate. In addition, this data may be calculated in the process of migrating a replica between edge computing servers. In response to these problems, we use cryptography to authenticate and ensure the security of the data to address security issues of mutual authentication, non-repudiation, anonymity, and integrity.