{"id":23290,"date":"2023-08-29T10:05:41","date_gmt":"2023-08-29T08:05:41","guid":{"rendered":"https:\/\/www.cubro.com\/?p=23290"},"modified":"2024-10-23T16:13:39","modified_gmt":"2024-10-23T14:13:39","slug":"enhancing-security-measures-for-mobile-edge-computing-mec","status":"publish","type":"post","link":"https:\/\/www.cubro.com\/en\/blog\/enhancing-security-measures-for-mobile-edge-computing-mec\/","title":{"rendered":"Mobile Edge Computing (MEC): Enhancing Security Measures"},"content":{"rendered":"\n<p>Gartner defines edge computing as&nbsp;solutions that facilitate data processing at or near the source of data generation. For example, in the context of the&nbsp;Internet of Things&nbsp;(IoT), the sources of data generation are usually things with sensors or embedded devices. Edge computing serves as the decentralized extension of the campus networks, cellular networks, data center networks or the cloud. <em>(Source: &nbsp;https:\/\/www.gartner.com\/smarterwithgartner\/what-edge-computing-means-for-infrastructure-and-operations-leaders)<\/em><\/p>\n\n\n\n<p>MEC is often advertised as an independent entity, but in practice, the processing of data for both the User Plane (UP) and Control Plane (CP) is still centralized. In other words, part of the processing is executed at the Edge site while the central site does the aggregation and analysis of the whole data.&nbsp;Many probe systems operate this way by collecting the data on the site, anonymizing the data and sending the data for central processing.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-1-2.png\" alt=\"Distributed data architecture with MEC\" class=\"wp-image-23293\" width=\"681\" height=\"408\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-1-2.png 908w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-1-2-480x288.png 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-1-2-240x144.png 240w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-1-2-768x460.png 768w\" sizes=\"(max-width: 681px) 100vw, 681px\" \/><figcaption class=\"wp-element-caption\"><em>Figure 1: Distributed data architecture with MEC \u2013 non-encrypted traffic from sites to central data center<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Unlike with a direct cable connection, this data is sent over the company\u2019s data network using TCP\/IP. To comply with data security and privacy, this solution needs a more secure method of sharing the data. Cubro\u2019s solution uses a VPN connection from the sites to the central data center.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-2-1.png\" alt=\"\" class=\"wp-image-23295\" width=\"681\" height=\"372\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-2-1.png 908w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-2-1-480x262.png 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-2-1-240x131.png 240w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-2-1-768x420.png 768w\" sizes=\"(max-width: 681px) 100vw, 681px\" \/><figcaption class=\"wp-element-caption\"><em>Figure 2: Distributed data architecture with MEC \u2013 Omnia120 at every site for a secure VPN connection<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Cubro&#8217;s comprehensive approach integrates tapping, network packet brokering, packet routing, and data encryption through VPN services. Although VPN connections are considered slow, Cubro&#8217;s VPN has been tested to provide 300 Mbps. Cubro uses Omnia120 at both ends, one Omnia120 is for establishing a secure, encrypted VPN connection while the receiving end removes the VPN tunnel and provides the data to the recipient without encryption. This connection is established by using a physical cable.<\/p>\n\n\n\n<p>Omnia120 has a unique architecture with Silicone on Chip and two ARM processors. One ARM CPU is used for the VPN connection while the chipset and second ARM CPU can be used for other tasks such as packet deduplication and packet filtering including Regex or the user can use, for example, Wireshark.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-3-1.png\" alt=\"\" class=\"wp-image-23297\" width=\"681\" height=\"234\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-3-1.png 908w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-3-1-480x165.png 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-3-1-240x82.png 240w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-3-1-768x264.png 768w\" sizes=\"(max-width: 681px) 100vw, 681px\" \/><figcaption class=\"wp-element-caption\"><em>Figure 3: Omnia120 architecture<\/em><br><\/figcaption><\/figure><\/div>\n\n\n<p>Enterprises may also use Omnic, Cubro SmartNIC, with the same software.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-4-1.png\" alt=\"\" class=\"wp-image-23299\" width=\"681\" height=\"465\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-4-1.png 908w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-4-1-480x328.png 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-4-1-240x164.png 240w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Picture-4-1-768x524.png 768w\" sizes=\"(max-width: 681px) 100vw, 681px\" \/><figcaption class=\"wp-element-caption\"><em>Figure 4: Cubro Omnic in hardware enclosure<\/em><br><\/figcaption><\/figure><\/div>\n\n\n<p>Communication to the Omnia120 and Omnic is also encrypted using certificates that authenticate the user and encrypt the traffic.<\/p>\n\n\n\n<p>As the prominence of MEC and distributed processing grows within enterprises and CSPs, data transfer is streamlined and bolstered by enhanced security measures. Cubro&#8217;s expertise extends to facilitating GDPR compliance by addressing Personally Identifiable Information (PII) concerns across the data chain.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As MEC and distributed processing gain prominence, data transfer is streamlined with enhanced security. Cubro ensures GDPR compliance by addressing PII concerns in the data chain.<\/p>\n","protected":false},"author":4,"featured_media":23306,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","_uag_custom_page_level_css":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","neve_meta_reading_time":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[10,6],"tags":[220,284,283,282,217,207],"class_list":["post-23290","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices","category-tech-trends","tag-cubro-network-visibility","tag-iot","tag-mec","tag-mobile-edge-computing","tag-network-monitoring","tag-network-visibility"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Mobile-Edge-Computing-.jpg",1200,627,false],"thumbnail":["https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Mobile-Edge-Computing--240x125.jpg",240,125,true],"medium":["https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Mobile-Edge-Computing--480x251.jpg",480,251,true],"medium_large":["https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Mobile-Edge-Computing--768x401.jpg",768,401,true],"large":["https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Mobile-Edge-Computing-.jpg",1200,627,false],"1536x1536":["https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Mobile-Edge-Computing-.jpg",1200,627,false],"2048x2048":["https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Mobile-Edge-Computing-.jpg",1200,627,false],"neve-blog":["https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Mobile-Edge-Computing--930x620.jpg",930,620,true]},"uagb_author_info":{"display_name":"Tamanna","author_link":"https:\/\/www.cubro.com\/en\/blog\/author\/tamanna\/"},"uagb_comment_info":0,"uagb_excerpt":"As MEC and distributed processing gain prominence, data transfer is streamlined with enhanced security. Cubro ensures GDPR compliance by addressing PII concerns in the data chain.","_links":{"self":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/posts\/23290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/comments?post=23290"}],"version-history":[{"count":6,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/posts\/23290\/revisions"}],"predecessor-version":[{"id":26458,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/posts\/23290\/revisions\/26458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/media\/23306"}],"wp:attachment":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/media?parent=23290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/categories?post=23290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/tags?post=23290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}