Filters








2,588 Hits in 6.4 sec

Trust Enforced Computational Offloading for Health Care Applications in Fog Computing

V. Meena, Meghana Gorripatti, T. Suriya Praba
2021 Wireless personal communications  
And the simulation results show that proposed TEFLON framework improves success rate of fog collaboration with reduced average latency for delay sensitive applications and ensures trust for trustworthy  ...  In this paper we propose novel Trust Enforced computation ofFLoading technique for trust worthy applications using fOg computiNg (TEFLON).  ...  Proposed Trust Enforced Computational Offloading for Healthcare Applications In twenty first century number of IoT devices and IoT based applications are increasing in the exponential scale.  ... 
doi:10.1007/s11277-021-08285-7 pmid:33840908 pmcid:PMC8022126 fatcat:3pwoeiavjzcj3oeiuygrhtjwcm

Securing IoT-Empowered Fog Computing Systems: Machine Learning Perspective

Tariq Ahamed Ahanger, Usman Tariq, Atef Ibrahim, Imdad Ullah, Yassine Bouteraa, Fayez Gebali
2022 Mathematics  
It examines ML techniques for identifying anomalies and attacks, showcases IoT data growth solutions, and delves into Fog computing security concerns.  ...  The current research provides a comprehensive review of the IoT evolution, Fog computation, and artificial-intelligence-inspired machine learning (ML) strategies.  ...  As a result, it is not easy to provide a safe connection between Fog and IoT devices and create a secure computing environment.  ... 
doi:10.3390/math10081298 fatcat:moh4delhojacvle4kuk35kawwm

Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review [article]

Abdullah Al-Noman Patwary, Anmin Fu, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Md Anwarul Kaium Patwary, Erfan Aghasian
2020 arXiv   pre-print
Therefore, trust and privacy is also a key challenge to gain market adoption for Fog.  ...  Hence, the security of Fog devices is a major concern in the Fog computing environment. Furthermore, mitigating and preventing those security measures is a research issue.  ...  Therefore, it is a challenging issue to assure trusted communication and make a secure computing environment between the Fog and IoT devices.  ... 
arXiv:2003.00395v1 fatcat:32jta5ijkzb2nfi2hzatz5pbvi

Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control

Abdullah Al-Noman Patwary, Ranesh Kumar Naha, Saurabh Garg, Sudheer Kumar Battula, Md Anwarul Kaium Patwary, Erfan Aghasian, Muhammad Bilal Amin, Aniket Mahanti, Mingwei Gong
2021 Electronics  
Moreover, the Blockchain-based solutions towards a secure Fog computing environment is presented and various research challenges and directions for future research are discussed.  ...  Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last  ...  Therefore, it is a challenging issue to assure trusted communication and make a secure computing environment between the Fog and IoT devices.  ... 
doi:10.3390/electronics10101171 fatcat:h2q4vbw4dja4ho5tbdj4ijbnje

Guest Editorial Special Issue on Emerging Trends and Challenges in Fog Computing for IoT

Constandinos X. Mavromoustakis, Mithun Mukherjee, George Mastorakis, Houbing Song, Maria Gorlatova, Mohammad Aazam
2020 IEEE Internet of Things Journal  
/KISATS approved/accredited) in electronic and computer engineering from the Technical University of Crete, Crete, Greece, the M.Sc. degree in telecommunications from the University College of London,  ...  ., and M.Eng.  ...  of Vehicles environment for fog computing and 5G networks."  ... 
doi:10.1109/jiot.2020.2982520 fatcat:ifdsxh7jkff3dinv2wje6dboci

Access Control in Fog Computing: Challenges and Research Agenda

Mohammed Aleisa, Abdullah Abuhussein, Frederick T. Sheldon
2020 IEEE Access  
The selection of AC models for cloud-based IoT environments is highly dependent on the application requirements and how the AC models can impact the computation overhead.  ...  Fog computing is an intermediate computing layer that has emerged to address the latency issues of cloud-based Internet of things (IoT) environments.  ...  The trusted authority can be defined to design a trust model in the fog computing environment.  ... 
doi:10.1109/access.2020.2992460 fatcat:ksl7yrz3anac7kyjyv3s7hvwiq

BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks

Tanesh Kumar, Erkki Harjula, Muneeb Ejaz, Ahsan Manzoor, Pawani Porambage, Ijaz Ahmad, Madhusanka Liyanage, An Braeken, Mika Ylianttila
2020 IEEE Access  
The work presented in [30] describe an enhanced, trusted execution environment for industrial IoT edge devices. C.  ...  Authors in [32] described a blockchain based framework to enhance the IoT data quality and reliability through the edge computing environment.  ...  Kumar Her current interests include security and privacy protocols for IoT, cloud and fog, blockchain and 5G security. She is (co-)author of over 120 publications.  ... 
doi:10.1109/access.2020.3017891 fatcat:3n42cki5hbbyhdve6a7zxyedee

A Review on Data protection and privacy in Fog Computing Network

Babitha M N, Siddappa M
2021 International Research Journal on Advanced Science Hub  
Especially with grow of billions of IoT devices, Fog computing processing at network edge has many advantages in the form of efficient data processing, ability to react the event quickly, reduction in  ...  These works studies the existing solutions for information protection in and secure information processing as well as load balancing at network edges of Fog computing network.  ...  The work assumes a reputed trust relationship between device and Fog computing node but the scheme fails for internal attackers in Fog network.  ... 
doi:10.47392/irjash.2021.101 fatcat:tcot7a5or5harnmsm3nf2snfjy

Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree Solutions: A Review

Neelam Saleem Khan, Mohammad Ahsan Chishti
2020 Scalable Computing : Practice and Experience  
Fog provides a platform for IoT along with other services like networking, storage and computing. With the tremendous expansion of IoT, security threats also arise.  ...  The evolving communication paradigm among cloud servers, Fog nodes and IoT devices are establishing a multilevel communication infrastructure.  ...  There are a variety of authentication schemes for IoT. These schemes have distinct heterogeneous underlying architectures and environments which back IoT devices.  ... 
doi:10.12694/scpe.v21i3.1782 fatcat:y76owz4t2ja3hgj6mka6scrzsa

Privacy-Preserving Internet of Things: Techniques and Applications

2019 International Journal of Engineering and Advanced Technology  
A large number of techniques and approaches have been implemented and used in different IoT based applications such as cloud computing based IoT, fog computing based IoT, blockchain based IoT and trajectory  ...  Hence, it is necessary to preserve the privacy of data collected by IoT devices.  ...  A privacy preserving data search framework for fog-assisted IoT system is proposed in [27] .  ... 
doi:10.35940/ijeat.f8830.088619 fatcat:onkuoapbkzhdtggza6ib7jj5ka

A Secure Internet of Things based Smart Monitoring System

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
For experimental purpose, Raspberry Pi used as a fog node and local cloud server to monitor the environment in real-time, SQLite is used as buffer storage.  ...  In this article, the authors proposed a secure framework for data collection and further processing from the sensors network to the core of the network using Fog-Cloud based architecture.  ...  Task Scheduling: In a larger IoT application where more number of fog devices are connected for computing.  ... 
doi:10.35940/ijitee.i8240.078919 fatcat:b4bpigsgxzgrffd3msnz242eji

A Fog Computing-based Framework for Privacy Preserving IoT Environments

Dhiah el Diehn Abou-Tair, Simon Büchsenstein, Ala' Khalifeh
2020 ˜The œinternational Arab journal of information technology  
In this paper, a security and privacy preserving framework is proposed, which utilizes Fog and cloud computing in conjunction with IoT devices that aims at securing the users' data and protecting their  ...  Fog and cloud computing have been recently integrated in IoT environment to solve their resources' limitations, thus facilitating new life scenarios-oriented applications.  ...  Conclusions In this paper, a Fog and cloud-based IoT framework is proposed that can be used to provide a secure and privacy-preserving environment for IoT oriented applications.  ... 
doi:10.34028/iajit/17/3/4 fatcat:3bdvyma6kbc3hdd5nybqa66h5q

The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey

Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir
2019 Sensors  
Then, an in-depth analysis of the fog computing security challenges and big data privacy and trust concerns in relation to fog-enabled IoT are given.  ...  We also discuss blockchain as a key enabler to address many security related issues in IoT and consider closely the complementary interrelationships between blockchain and fog computing.  ...  Authentication plays a crucial role in setting a trustful connection between fog nodes and IoT devices.  ... 
doi:10.3390/s19081788 fatcat:iazdjbrwwfdwxfrpkwpzjf4i3m

Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications

Kenneth Li Minn Ang, Jasmine Kah Phooi Seng, Ericmoore Ngharamike
2022 Future Internet  
This paper presents a comprehensive survey for this new Crowdsourcing IoT paradigm from four different perspectives: (1) Architectures for Crowd-IoT; (2) Trustworthy, Privacy and Security for Crowd-IoT  ...  Crowdsourcing can play an important role in the Internet of Things (IoT) applications for information sensing and gathering where the participants are equipped with geolocated devices.  ...  The authors designed and implemented Medusa, which is a novel programming framework to provide high-level abstractions for specifying the steps for a crowd-sensing task. Medusa  ... 
doi:10.3390/fi14020049 fatcat:o62tjaayyvfnjc75irzkpzu5vy

Security Enhancement of IoT and Fog Computing Via Blockchain Applications

Ramadan T. H. Hasan, IT Department, Technical College of Informatics Akre, Duhok Polytechnic University, Duhok, Kurdistan Region, IRAQ, Siddeeq Y. Ameen, IT Department, Technical College of Informatics Akre, Duhok Polytechnic University, Duhok, Kurdistan Region, IRAQ
2021 Journal of Soft Computing and Data Mining  
The development of IoT and Fog Computing technologies in different fields has resulted in a major improvement in distributed networks.  ...  Then we explained Fog computing, Generic Security Requirements for Fog Computing, and we also discussed Blockchain applications that enhance Fog Computing Security.  ...  autonomously in a trustless environment, and a better system for data protection and privacy will be needed. It is time to think about decentralization for future IoT services computing.  ... 
doi:10.30880/jscdm.2021.02.02.003 fatcat:i24c772rdra7taafliel7uxbma
« Previous Showing results 1 — 15 out of 2,588 results