Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions
In recent times, the machine learning (ML) community has recognized the deep learning
(DL) computing model as the Gold Standard. DL has gradually become the most widely …
(DL) computing model as the Gold Standard. DL has gradually become the most widely …
A survey on IoT security: application areas, security threats, and solution architectures
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects
can be empowered to create, receive, and exchange data in a seamless manner. Various …
can be empowered to create, receive, and exchange data in a seamless manner. Various …
Security and trust issues in fog computing: A survey
Fog computing uses one or more collaborative end users or near-user edge devices to
perform storage, communication, control, configuration, measurement and management …
perform storage, communication, control, configuration, measurement and management …
Attribute-based encryption for cloud computing access control: A survey
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
A survey on secure data analytics in edge computing
Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are
generated by IoT devices. Those data after analytics provide significant information that …
generated by IoT devices. Those data after analytics provide significant information that …
Lightweight fine-grained search over encrypted data in fog computing
Fog computing, as an extension of cloud computing, outsources the encrypted sensitive data
to multiple fog nodes on the edge of Internet of Things (IoT) to decrease latency and network …
to multiple fog nodes on the edge of Internet of Things (IoT) to decrease latency and network …
Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things
Fog computing is a paradigm that extends cloud computing to the edge of the network. It can
provide computation and storage services to end devices in Internet of Things (IoT). Attribute …
provide computation and storage services to end devices in Internet of Things (IoT). Attribute …
Security in Internet of Things: A review
Internet of Things (IoT) is the paramount virtual network that enables remote users to access
connected multimedia devices. It has dragged the attention of the community because it …
connected multimedia devices. It has dragged the attention of the community because it …
A deep bidirectional LSTM-GRU network model for automated ciphertext classification
Long Short-Term Memory (LSTM) and Gated Recurrent Units (GRU) are a class of Recurrent
Neural Networks (RNN) suitable for sequential data processing. Bidirectional LSTM …
Neural Networks (RNN) suitable for sequential data processing. Bidirectional LSTM …