A survey of security in cloud, edge, and fog computing

A Ometov, OL Molua, M Komarov, J Nurmi - Sensors, 2022‏ - mdpi.com
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …

A survey of iot privacy security: Architecture, technology, challenges, and trends

P Sun, S Shen, Y Wan, Z Wu, Z Fang… - IEEE Internet of Things …, 2024‏ - ieeexplore.ieee.org
The Internet of Things (IoT) is used in homes and hospitals and deployed outdoors to control
and report environmental changes, prevent fires, and perform many more beneficial …

Role of machine learning and deep learning in securing 5G-driven industrial IoT applications

P Sharma, S Jain, S Gupta, V Chamola - Ad Hoc Networks, 2021‏ - Elsevier
Abstract The Internet of Things (IoT) connects millions of computing devices and has set a
stage for future technology where industrial use cases like smart cities and smart houses will …

Ai-based mobile edge computing for iot: Applications, challenges, and future scope

A Singh, SC Satapathy, A Roy, A Gutub - Arabian Journal for Science and …, 2022‏ - Springer
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …

Multi-access edge computing architecture, data security and privacy: A review

B Ali, MA Gregory, S Li - Ieee Access, 2021‏ - ieeexplore.ieee.org
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to
provide computation, storage, and networking capabilities at the edge of the network in …

Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions

M Mahbub, RM Shubair - Journal of Network and Computer Applications, 2023‏ - Elsevier
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …

Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey

J Singh, M Wazid, AK Das, V Chamola… - Computer …, 2022‏ - Elsevier
The cyber physical systems integrate the sensing, computation, control and networking
processes into physical objects and infrastructure, which are connected through the Internet …

A maturity framework for zero‐trust security in multiaccess edge computing

B Ali, S Hijjawi, LH Campbell… - Security and …, 2022‏ - Wiley Online Library
Multiaccess Edge Computing (MEC) has been adopted to provide an environment that
supports cloud computing capabilities and IT services at the network edge. The open …

[HTML][HTML] Blockchain based context-aware CP-ABE schema for Internet of Medical Things security

B Annane, A Alti, A Lakehal - Array, 2022‏ - Elsevier
Nowadays, the number of corona patients is increasing significantly. The relationship
between the Internet of Medical Things (IoMT) and the Internet is struggling to keep up with …

Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and develo** effective safeguard

M Pathak, KN Mishra, SP Singh - Artificial Intelligence Review, 2024‏ - Springer
Abstract The Internet of Things (IoT) is a powerful technology adopted in various industries.
Applications of the IoT aim to enhance automation, productivity, and user comfort in a cloud …