A survey of security in cloud, edge, and fog computing

A Ometov, OL Molua, M Komarov, J Nurmi - Sensors, 2022 - mdpi.com
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …

Multi-access edge computing architecture, data security and privacy: A review

B Ali, MA Gregory, S Li - IEEE Access, 2021 - ieeexplore.ieee.org
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to
provide computation, storage, and networking capabilities at the edge of the network in …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Towards a secure incremental proxy re‐encryption for e‐healthcare data sharing in mobile cloud computing

T Bhatia, AK Verma, G Sharma - … and Computation: Practice …, 2020 - Wiley Online Library
Cloud computing provides universal access to a pool of shared resources to numerous
stakeholders/shareholders of the e‐healthcare industry. The speedy adoption of cloud …

[HTML][HTML] The future of computing paradigms for medical and emergency applications

D Alekseeva, A Ometov, O Arponen… - Computer Science Review, 2022 - Elsevier
Healthcare is of particular importance in everyone's life, and kee** the advancement of it
on a good pace is a priority of any country, as it highly influences the overall well-being of its …

Privacy and data protection in mobile cloud computing: A systematic map** study

HM Alnajrani, AA Norman, BH Ahmed - Plos one, 2020 - journals.plos.org
As a result of a shift in the world of technology, the combination of ubiquitous mobile
networks and cloud computing produced the mobile cloud computing (MCC) domain. As a …

Workload prediction of cloud computing based on SVM and BP neural networks

Q Sun, Z Tan, X Zhou - Journal of Intelligent & Fuzzy Systems, 2020 - content.iospress.com
In this study, support vector machine (SVM) and back-propagation (BP) neural networks
were combined to predict the workload of cloud computing physical machine, so as to …

[HTML][HTML] PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing

SC Sukumaran, M Misbahuddin - … of King Saud University-Computer and …, 2021 - Elsevier
Cloud computing technology got relevance as computing paradigm, which delivers
massively scalable computing technologies based on the Internet for the organizations …

Analysis of wireless communication networks under edge computing scenarios

J Wang - Wireless Networks, 2022 - Springer
In communication networks, edge computing is a method of distributing processing, storage,
and bandwidth resources to the side of the network that is closest to the user. This could be …

[PDF][PDF] 边缘计算数据安全与隐私保护研究综述

张佳乐, 赵彦超, 陈兵, 胡峰… - Journal on …, 2018 - infocomm-journal.com
随着物联网, 大数据和5G 网络的快速发展和广泛应用, 传统的云计算无法处理网络边缘设备所
产生的海量数据, 因此, 边缘计算应运而生. 然而, 由于边缘计算的内容感知, 实时计算 …