Journal of Health Care Communications Open Access

  • ISSN: 2472-1654
  • Journal h-index: 15
  • Journal CiteScore: 6.77
  • Journal Impact Factor: 7.34
  • Average acceptance to publication time (5-7 days)
  • Average article processing time (30-45 days) Less than 5 volumes 30 days
    8 - 9 volumes 40 days
    10 and more volumes 45 days
Reach us +32 25889658

Commentary Article - (2023) Volume 8, Issue 1

Remote Attestation for Multimedia Mobile Edge Computing Security
Zhiyong Zhang*
Department of Nanofabrication, Nanjing University of Science and Technology, China
*Correspondence: Zhiyong Zhang, Department of Nanofabrication, Nanjing University of Science and Technology, China, Email:

Received: 31-Jan-2023, Manuscript No. IPJHCC-23-15641; Editor assigned: 02-Feb-2023, Pre QC No. IPJHCC-23-15641 (PQ); Reviewed: 16-Feb-2023, QC No. IPJHCC-23-15641; Revised: 21-Feb-2023, Manuscript No. IPJHCC-23-15641 (R); Published: 28-Feb-2023, DOI: 10.36846/2472-1654-8.1.8009


Mixed Mobile Edge Computing (MMEC) is a little sight and sound cloud server farm that gives registering capacity, examination, and independent direction. Contrasted with customary correspondence among terminals and focal mists, MMEC is nearer to terminals as far as mentioning and conveying media assets. In that capacity, MMEC assumes an uncommon part in lessening network dormancy, easing strain on network data transmission, and further developing reaction times. In any case, the presence of unapproved sight and sound gadgets and shaky transmission channels lead to different goes after, for example, in MMEC conditions, it is a dire make a difference to guarantee that main secure gadgets can speak with confided in gadgets over planned secure channels. Luckily, believed figuring is a powerful validation instrument that takes care of possibly risky framework security issues for gadgets.

Specifically, distant validation innovation is fundamental for believed processing, which gives personality confirmation, uprightness estimations, and dependable announcing. Hence, RA furnishes thoughts and strategies to manage the above issues. Beforehand, a few plans were proposed individually, and a lightweight key trade convention in view of public-key and gathering of public-key cryptographic systems was proposed in key understanding. Notwithstanding, since costly bilinear pair tasks were acted in this convention, a key understanding plan was suggested that gives character based unique shared validation that accomplishes common verification and meeting key age without presenting a confided in outsider. I was. In protection security, proposed a security insurance confirmation plot, which guaranteed enforceability, recognisability, hostile to replay assaults, set forward a security assurance convention utilizing cryptographic innovation, which safeguarded the security and security of information.

Nonetheless, the security and protection issues of the transmission layer were overlooked. A short time later, consolidated cryptography innovation with data transmission convention, a security insurance convention was proposed. It ensures information security and transmission security. recommended an unknown validation strategy utilizing non-intelligent zero-information evidences that accomplished unlinkability and least openness with regards to character verification set forward a lightweight and effective personality confirmation convention, which gave client namelessness, wonderful forward confidential and replay insurance proposed a savvy card-based secure tending to and confirmation conspire, yet there are significant limits for gadgets without shrewd cards set forward a shared confirmation plot, which built the camera-MEC-cloud security space to oppose different assaults. Nonetheless, the above conspire didn’t quantify and confirm gadget honesty.

On the other hand, we propose a RA convention in light of a Confided in Stage Module that actions the trustworthiness of MEC hubs. Nonetheless, the honesty and legitimate character of possibly unreliable terminals were not thought of. To defeat the restrictions of current security strategies, we propose the “MMECRA model and convention” for MMEC security, which joins the twofold RA convention and the TLS1.3 handshake convention. The MMECRA handshake process includes mysterious shared confirmation, common trustworthiness estimation and check by the terminal and MMEC or MMEC and terminal members. To this end, MMECRA completely ensures information security, stage character security and upkeep of trustworthiness status when terminals demand interactive media assets from MMEC. Likewise, the MMECRA convention outflanks related security plans, including security protections and protection highlights. Moreover, the MMECRA convention successfully decreases the computational burden when mixed media asset request conditions are not serious.



Conflict Of Interest

The author declares there is no conflict of interest in publishing this article has been read and approved by all named authors.

Citation: Zhang Z (2023) Remote Attestation for Multimedia Mobile Edge Computing Security. J Healthc Commun. 8:8009.

Copyright: © 2023 Zhang Z. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.