{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:10:00Z","timestamp":1743131400211,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030870096"},{"type":"electronic","value":"9783030870102"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-87010-2_4","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T21:45:47Z","timestamp":1631223947000},"page":"44-59","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Preserving Access for\u00a0Multi-Access Edge Computing (MEC) Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8752-7232","authenticated-orcid":false,"given":"Gizem","family":"Akman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4579-3668","authenticated-orcid":false,"given":"Philip","family":"Ginzboorg","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3228-4904","authenticated-orcid":false,"given":"Valtteri","family":"Niemi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"key":"4_CR1","unstructured":"3GPP TS 23.501 V16.5.0: System architecture for the 5G System (5GS) (2020)"},{"issue":"3","key":"4_CR2","doi-asserted-by":"publisher","first-page":"1657","DOI":"10.1109\/COMST.2017.2705720","volume":"19","author":"T Taleb","year":"2017","unstructured":"Taleb, T., Samdanis, K., Mada, B., Flinck, H., Dutta, S., Sabella, D.: On multi-access edge computing: a survey of the emerging 5G network edge cloud architecture and orchestration. IEEE Commun. Surv. Tutorials 19(3), 1657\u20131681 (2017). https:\/\/doi.org\/10.1109\/COMST.2017.2705720","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2020.3001277","volume":"8","author":"Q Pham","year":"2020","unstructured":"Pham, Q., et al.: A survey of multi-access edge computing in 5G and beyond: fundamentals, technology integration, and state-of-the-art. IEEE Access 8, 1\u201344 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3001277","journal-title":"IEEE Access"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Parada, C., Fontes, F., Marque, C.S., Cunha, V., Leit\u00e3o, C.: Multi-access edge computing: a 5G technology. In: European Conference on Networks and Communications (EuCNC), Ljubljana, Slovenia, pp. 277\u2013281. IEEE (2018). https:\/\/doi.org\/10.1109\/EuCNC.2018.8442492","DOI":"10.1109\/EuCNC.2018.8442492"},{"issue":"4","key":"4_CR5","doi-asserted-by":"publisher","first-page":"2961","DOI":"10.1109\/COMST.2018.2849509","volume":"20","author":"P Porambage","year":"2018","unstructured":"Porambage, P., Okwuibe, J., Liyanage, M., Ylianttila, M., Taleb, T.: Survey on multi-access edge computing for Internet of Things realization. IEEE Commun. Surv. Tutorials 20(4), 2961\u20132991 (2018). https:\/\/doi.org\/10.1109\/COMST.2018.2849509","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Okwuibe, J., Liyanage, M., Ahmad, I., Ylianttila, M.: Cloud and MEC security. A comprehensive Guide to 5G security, pp. 373\u2013397. Wiley (2018). https:\/\/doi.org\/10.1002\/9781119293071.ch16","DOI":"10.1002\/9781119293071.ch16"},{"key":"4_CR7","unstructured":"ETSI White Paper No. 28: MEC in 5G Networks; First Edition (2018)"},{"key":"4_CR8","unstructured":"ETSI GS MEC 002 V2.1.1: Multi-access Edge Computing (MEC); Phase 2: Use Cases and Requirements. Group Specification (2018)"},{"key":"4_CR9","unstructured":"ETSI GS MEC 030 V2.1.1: Multi-access Edge Computing (MEC); V2X Information Service API. Group Specification (2020)"},{"key":"4_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3062546","author":"P Ranaweera","year":"2021","unstructured":"Ranaweera, P., Jurcut, A.D., Liyanage, M.: Survey on multi-access edge computing security and privacy. IEEE Commun. Surv. Tutorials (2021). https:\/\/doi.org\/10.1109\/COMST.2021.3062546","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"4_CR11","unstructured":"3GPP TS 33.102 V16.0.0: 3G Security; Security architecture (2020)"},{"key":"4_CR12","unstructured":"3GPP TS 33.501 V16.3.0: Security architecture and procedures for 5G system (2020)"},{"key":"4_CR13","unstructured":"University of Delaware, Secure UD: Managing data confidentiality. https:\/\/www1.udel.edu\/security\/data\/confidentiality.html. Accessed 28 July 2020"},{"key":"4_CR14","unstructured":"Paverd, A.J., Martin, A., Brown, I.: Modelling and automatically analyzing privacy properties for honest-but-curious adversaries. Technical report (2014)"},{"issue":"1","key":"4_CR15","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOMSTD.2018.1700063","volume":"2","author":"I Ahmad","year":"2018","unstructured":"Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., Gurtov, A.: Overview of 5G security challenges and solutions. IEEE Commun. Stand. Mag. 2(1), 36\u201343 (2018). https:\/\/doi.org\/10.1109\/MCOMSTD.2018.1700063","journal-title":"IEEE Commun. Stand. Mag."},{"issue":"8","key":"4_CR16","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MCOM.2018.1701148","volume":"56","author":"M Du","year":"2018","unstructured":"Du, M., Wang, K., Chen, Y., Wang, X., Sun, Y.: Big data privacy preserving in multi-access edge computing for heterogeneous internet of things. IEEE Commun. Mag. 56(8), 62\u201367 (2018). https:\/\/doi.org\/10.1109\/MCOM.2018.1701148","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"4_CR17","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","volume":"22","author":"R Khan","year":"2020","unstructured":"Khan, R., Kumar, P., Jayakody, D., Liyanage, M.: A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutorials 22(1), 196\u2013248 (2020). https:\/\/doi.org\/10.1109\/COMST.2019.2933899","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"4_CR18","doi-asserted-by":"publisher","unstructured":"Zhang, P., Durresi, M., Durresi, A.: Mobile privacy protection enhanced with multi-access edge computing. In: IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), pp. 724\u2013731 (2018). https:\/\/doi.org\/10.1109\/AINA.2018.00109","DOI":"10.1109\/AINA.2018.00109"},{"issue":"2","key":"4_CR19","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1109\/COMST.2015.2496624","volume":"18","author":"A Alshalan","year":"2016","unstructured":"Alshalan, A., Pisharody, S., Huang, D.: A survey of mobile VPN technologies. IEEE Commun. Surv. Tutorials 18(2), 1177\u20131196 (2016). https:\/\/doi.org\/10.1109\/COMST.2015.2496624","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"4_CR20","doi-asserted-by":"publisher","unstructured":"Chauhan, M., Singh, A.K., Komal: Survey of onion routing approaches: advantages, limitations and future scopes. In: Pandian, A., Palanisamy, R., Ntalianis, K. (eds.) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). ICCBI 2019. LNDECT, vol. 49, pp. 686\u2013697. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-43192-1_76","DOI":"10.1007\/978-3-030-43192-1_76"},{"key":"4_CR21","doi-asserted-by":"publisher","unstructured":"Ojanper\u00e4, T., van den Berg, H., IJntema, W., de Souza Schwartz, R., Djurica, M.: Application synchronization among multiple MEC servers in connected vehicle scenarios. In: 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), Chicago, IL, USA, pp. 1\u20135. IEEE (2018). https:\/\/doi.org\/10.1109\/VTCFall.2018.8691039","DOI":"10.1109\/VTCFall.2018.8691039"},{"issue":"1","key":"4_CR22","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.tcs.2005.03.003","volume":"340","author":"J Herzog","year":"2005","unstructured":"Herzog, J.: A computational interpretation of Dolev-Yao adversaries. Theor. Comput. Sci. 340(1), 57\u201381 (2005). https:\/\/doi.org\/10.1016\/j.tcs.2005.03.003","journal-title":"Theor. Comput. Sci."},{"key":"4_CR23","unstructured":"ICO (Information Commisioners\u2019 Office) News: Estate agency fined & #x00A3;80,000 for failing to keep tenants\u2019 data safe (2009). https:\/\/ico.org.uk\/about-the-ico\/news-and-events\/news-and-blogs\/2019\/07\/estate-agency-fined-80-000-for-failing-to-keep-tenants-data-safe\/. Accessed 22 April 2021"},{"key":"4_CR24","unstructured":"Freedman, M.: How businesses are collecting data (and what they\u2019re doing with it) (2020). https:\/\/www.businessnewsdaily.com\/10625-businesses-collecting-data.html. Accessed 22 Apr 2021"},{"key":"4_CR25","unstructured":"IETF RFC 6347: Datagram Transport Layer Security Version 1.2 (2012)"},{"key":"4_CR26","unstructured":"IETF RFC 8446: The Transport Layer Security (TLS) Protocol Version 1.3 (2018)"},{"key":"4_CR27","doi-asserted-by":"publisher","unstructured":"Reardon, J., Goldberg, I.: Improving TOR using a TCP-over-DTLS tunnel. In: Proceedings of the 18th Conference on USENIX Security Symposium (SSYM 2009), USA, pp. 119\u2013134 (2009). https:\/\/doi.org\/10.5555\/1855768.1855776","DOI":"10.5555\/1855768.1855776"},{"key":"4_CR28","unstructured":"IETF RFC 5246: The Transport Layer Security (TLS) Protocol Version 1.2 (2008)"},{"issue":"4","key":"4_CR29","doi-asserted-by":"publisher","first-page":"2372","DOI":"10.1109\/INFCOM.2005.1498523","volume":"2005","author":"W Feng","year":"2005","unstructured":"Feng, W., Kaiser, E., Luu, A.: Design and implementation of network puzzles. Proc. IEEE Infocom 2005(4), 2372\u20132382 (2005). https:\/\/doi.org\/10.1109\/INFCOM.2005.1498523","journal-title":"Proc. IEEE Infocom"},{"issue":"1","key":"4_CR30","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TIFS.2017.2737970","volume":"13","author":"VF Taylor","year":"2018","unstructured":"Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: Robust smartphone app identification via encrypted network traffic analysis. IEEE Trans. Inf. Forensics Secur. 13(1), 63\u201378 (2018). https:\/\/doi.org\/10.1109\/TIFS.2017.2737970","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR31","doi-asserted-by":"publisher","unstructured":"Saltaformaggio, B., et al.: Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic. In: Proceedings of the 10th USENIX Conference on Offensive Technologies (WOOT 2016), pp. 69\u201378 (2016). https:\/\/doi.org\/10.5555\/3027019.3027026","DOI":"10.5555\/3027019.3027026"},{"key":"4_CR32","unstructured":"Pironti, A., Strub, P.Y., Bhargavan, K.: Identifying website users by TLS traffic analysis: new attacks and effective countermeasures, Rev. 1. INRIA Paris (2012)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87010-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T17:56:07Z","timestamp":1632506167000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87010-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030870096","9783030870102"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87010-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Customed version of CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1588","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}