Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions

S Ahmad, I Shakeel, S Mehfuz, J Ahmad - Computer Science Review, 2023 - Elsevier
In recent times, the machine learning (ML) community has recognized the deep learning
(DL) computing model as the Gold Standard. DL has gradually become the most widely …

A survey on IoT security: application areas, security threats, and solution architectures

V Hassija, V Chamola, V Saxena, D Jain, P Goyal… - IEEe …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects
can be empowered to create, receive, and exchange data in a seamless manner. Various …

Security and trust issues in fog computing: A survey

PY Zhang, MC Zhou, G Fortino - Future Generation Computer Systems, 2018 - Elsevier
Fog computing uses one or more collaborative end users or near-user edge devices to
perform storage, communication, control, configuration, measurement and management …

Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

A survey on secure data analytics in edge computing

D Liu, Z Yan, W Ding… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are
generated by IoT devices. Those data after analytics provide significant information that …

Lightweight fine-grained search over encrypted data in fog computing

Y Miao, J Ma, X Liu, J Weng, H Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Fog computing, as an extension of cloud computing, outsources the encrypted sensitive data
to multiple fog nodes on the edge of Internet of Things (IoT) to decrease latency and network …

Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things

Q Huang, Y Yang, L Wang - IEEE Access, 2017 - ieeexplore.ieee.org
Fog computing is a paradigm that extends cloud computing to the edge of the network. It can
provide computation and storage services to end devices in Internet of Things (IoT). Attribute …

Security in Internet of Things: A review

NA Khan, A Awang, SAA Karim - IEEE access, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is the paramount virtual network that enables remote users to access
connected multimedia devices. It has dragged the attention of the community because it …

A deep bidirectional LSTM-GRU network model for automated ciphertext classification

E Ahmadzadeh, H Kim, O Jeong, N Kim, I Moon - IEEE access, 2022 - ieeexplore.ieee.org
Long Short-Term Memory (LSTM) and Gated Recurrent Units (GRU) are a class of Recurrent
Neural Networks (RNN) suitable for sequential data processing. Bidirectional LSTM …