Edge computing is considered to be one of the key technologies in providing 5G low latency services. Benefi tted from the computing and storage close to the end users
mobile edge computing shall be able to offer runtime environment and resource to latency-sensitive applications
and shall also provide local service processing and fl exible routing. Meanwhile
mobile edge computing also introduced risks
such as unsafe environment
weak core control
mobile edge computing suffer from unauthorized access and sensitive data leakage
(D)DoS attacks. This paper introduces the concept and application scenario of edge computing
analyzes security threats
suggests a security protection framework and security protection solutions for mobile edge computing.