A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Trust Enforced Computational Offloading for Health Care Applications in Fog Computing
2021
Wireless personal communications
And the simulation results show that proposed TEFLON framework improves success rate of fog collaboration with reduced average latency for delay sensitive applications and ensures trust for trustworthy ...
In this paper we propose novel Trust Enforced computation ofFLoading technique for trust worthy applications using fOg computiNg (TEFLON). ...
Proposed Trust Enforced Computational Offloading for Healthcare Applications In twenty first century number of IoT devices and IoT based applications are increasing in the exponential scale. ...
doi:10.1007/s11277-021-08285-7
pmid:33840908
pmcid:PMC8022126
fatcat:3pwoeiavjzcj3oeiuygrhtjwcm
Securing IoT-Empowered Fog Computing Systems: Machine Learning Perspective
2022
Mathematics
It examines ML techniques for identifying anomalies and attacks, showcases IoT data growth solutions, and delves into Fog computing security concerns. ...
The current research provides a comprehensive review of the IoT evolution, Fog computation, and artificial-intelligence-inspired machine learning (ML) strategies. ...
As a result, it is not easy to provide a safe connection between Fog and IoT devices and create a secure computing environment. ...
doi:10.3390/math10081298
fatcat:moh4delhojacvle4kuk35kawwm
Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review
[article]
2020
arXiv
pre-print
Therefore, trust and privacy is also a key challenge to gain market adoption for Fog. ...
Hence, the security of Fog devices is a major concern in the Fog computing environment. Furthermore, mitigating and preventing those security measures is a research issue. ...
Therefore, it is a challenging issue to assure trusted communication and make a secure computing environment between the Fog and IoT devices. ...
arXiv:2003.00395v1
fatcat:32jta5ijkzb2nfi2hzatz5pbvi
Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
2021
Electronics
Moreover, the Blockchain-based solutions towards a secure Fog computing environment is presented and various research challenges and directions for future research are discussed. ...
Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last ...
Therefore, it is a challenging issue to assure trusted communication and make a secure computing environment between the Fog and IoT devices. ...
doi:10.3390/electronics10101171
fatcat:h2q4vbw4dja4ho5tbdj4ijbnje
Guest Editorial Special Issue on Emerging Trends and Challenges in Fog Computing for IoT
2020
IEEE Internet of Things Journal
/KISATS approved/accredited) in electronic and computer engineering from the Technical University of Crete, Crete, Greece, the M.Sc. degree in telecommunications from the University College of London, ...
., and M.Eng. ...
of Vehicles environment for fog computing and 5G networks." ...
doi:10.1109/jiot.2020.2982520
fatcat:ifdsxh7jkff3dinv2wje6dboci
Access Control in Fog Computing: Challenges and Research Agenda
2020
IEEE Access
The selection of AC models for cloud-based IoT environments is highly dependent on the application requirements and how the AC models can impact the computation overhead. ...
Fog computing is an intermediate computing layer that has emerged to address the latency issues of cloud-based Internet of things (IoT) environments. ...
The trusted authority can be defined to design a trust model in the fog computing environment. ...
doi:10.1109/access.2020.2992460
fatcat:ksl7yrz3anac7kyjyv3s7hvwiq
BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks
2020
IEEE Access
The work presented in [30] describe an enhanced, trusted execution environment for industrial IoT edge devices.
C. ...
Authors in [32] described a blockchain based framework to enhance the IoT data quality and reliability through the edge computing environment. ...
Kumar Her current interests include security and privacy protocols for IoT, cloud and fog, blockchain and 5G security. She is (co-)author of over 120 publications. ...
doi:10.1109/access.2020.3017891
fatcat:3n42cki5hbbyhdve6a7zxyedee
A Review on Data protection and privacy in Fog Computing Network
2021
International Research Journal on Advanced Science Hub
Especially with grow of billions of IoT devices, Fog computing processing at network edge has many advantages in the form of efficient data processing, ability to react the event quickly, reduction in ...
These works studies the existing solutions for information protection in and secure information processing as well as load balancing at network edges of Fog computing network. ...
The work assumes a reputed trust relationship between device and Fog computing node but the scheme fails for internal attackers in Fog network. ...
doi:10.47392/irjash.2021.101
fatcat:tcot7a5or5harnmsm3nf2snfjy
Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree Solutions: A Review
2020
Scalable Computing : Practice and Experience
Fog provides a platform for IoT along with other services like networking, storage and computing. With the tremendous expansion of IoT, security threats also arise. ...
The evolving communication paradigm among cloud servers, Fog nodes and IoT devices are establishing a multilevel communication infrastructure. ...
There are a variety of authentication schemes for IoT. These schemes have distinct heterogeneous underlying architectures and environments which back IoT devices. ...
doi:10.12694/scpe.v21i3.1782
fatcat:y76owz4t2ja3hgj6mka6scrzsa
Privacy-Preserving Internet of Things: Techniques and Applications
2019
International Journal of Engineering and Advanced Technology
A large number of techniques and approaches have been implemented and used in different IoT based applications such as cloud computing based IoT, fog computing based IoT, blockchain based IoT and trajectory ...
Hence, it is necessary to preserve the privacy of data collected by IoT devices. ...
A privacy preserving data search framework for fog-assisted IoT system is proposed in [27] . ...
doi:10.35940/ijeat.f8830.088619
fatcat:onkuoapbkzhdtggza6ib7jj5ka
A Secure Internet of Things based Smart Monitoring System
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
For experimental purpose, Raspberry Pi used as a fog node and local cloud server to monitor the environment in real-time, SQLite is used as buffer storage. ...
In this article, the authors proposed a secure framework for data collection and further processing from the sensors network to the core of the network using Fog-Cloud based architecture. ...
Task Scheduling: In a larger IoT application where more number of fog devices are connected for computing. ...
doi:10.35940/ijitee.i8240.078919
fatcat:b4bpigsgxzgrffd3msnz242eji
A Fog Computing-based Framework for Privacy Preserving IoT Environments
2020
˜The œinternational Arab journal of information technology
In this paper, a security and privacy preserving framework is proposed, which utilizes Fog and cloud computing in conjunction with IoT devices that aims at securing the users' data and protecting their ...
Fog and cloud computing have been recently integrated in IoT environment to solve their resources' limitations, thus facilitating new life scenarios-oriented applications. ...
Conclusions In this paper, a Fog and cloud-based IoT framework is proposed that can be used to provide a secure and privacy-preserving environment for IoT oriented applications. ...
doi:10.34028/iajit/17/3/4
fatcat:3bdvyma6kbc3hdd5nybqa66h5q
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
2019
Sensors
Then, an in-depth analysis of the fog computing security challenges and big data privacy and trust concerns in relation to fog-enabled IoT are given. ...
We also discuss blockchain as a key enabler to address many security related issues in IoT and consider closely the complementary interrelationships between blockchain and fog computing. ...
Authentication plays a crucial role in setting a trustful connection between fog nodes and IoT devices. ...
doi:10.3390/s19081788
fatcat:iazdjbrwwfdwxfrpkwpzjf4i3m
Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications
2022
Future Internet
This paper presents a comprehensive survey for this new Crowdsourcing IoT paradigm from four different perspectives: (1) Architectures for Crowd-IoT; (2) Trustworthy, Privacy and Security for Crowd-IoT ...
Crowdsourcing can play an important role in the Internet of Things (IoT) applications for information sensing and gathering where the participants are equipped with geolocated devices. ...
The authors designed and implemented Medusa, which is a novel programming framework to provide high-level abstractions for specifying the steps for a crowd-sensing task. Medusa ...
doi:10.3390/fi14020049
fatcat:o62tjaayyvfnjc75irzkpzu5vy
Security Enhancement of IoT and Fog Computing Via Blockchain Applications
2021
Journal of Soft Computing and Data Mining
The development of IoT and Fog Computing technologies in different fields has resulted in a major improvement in distributed networks. ...
Then we explained Fog computing, Generic Security Requirements for Fog Computing, and we also discussed Blockchain applications that enhance Fog Computing Security. ...
autonomously in a trustless environment, and a better system for data protection and privacy will be needed. It is time to think about decentralization for future IoT services computing. ...
doi:10.30880/jscdm.2021.02.02.003
fatcat:i24c772rdra7taafliel7uxbma
« Previous
Showing results 1 — 15 out of 2,588 results