A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, mobile edge computing, fog computing, and cloudlet

J Ren, D Zhang, S He, Y Zhang, T Li - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Sending data to the cloud for analysis was a prominent trend during the past decades,
driving cloud computing as a dominant computing paradigm. However, the dramatically …

Edge-computing-enabled smart cities: A comprehensive survey

LU Khan, I Yaqoob, NH Tran… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Recent years have disclosed a remarkable proliferation of compute-intensive applications in
smart cities. Such applications continuously generate enormous amounts of data which …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Security and trust issues in fog computing: A survey

PY Zhang, MC Zhou, G Fortino - Future Generation Computer Systems, 2018 - Elsevier
Fog computing uses one or more collaborative end users or near-user edge devices to
perform storage, communication, control, configuration, measurement and management …

From cloud to fog computing: A review and a conceptual live VM migration framework

O Osanaiye, S Chen, Z Yan, R Lu, KKR Choo… - IEEE …, 2017 - ieeexplore.ieee.org
Fog computing, an extension of cloud computing services to the edge of the network to
decrease latency and network congestion, is a relatively recent research trend. Although …

An efficient task scheduling approach using moth‐flame optimization algorithm for cyber‐physical system applications in fog computing

M Ghobaei‐Arani, A Souri, F Safara… - Transactions on …, 2020 - Wiley Online Library
With the rapid development of in modern technologies has led to a novel generation of
cyberspace equipment and secure analysis methods such as cyber‐physical system (CPS) …

Attribute based encryption with privacy protection and accountability for CloudIoT

J Li, Y Zhang, J Ning, X Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems
a very challenging task. More so when access and storage are performed through a cloud …

Fog computing: An overview of big IoT data analytics

MR Anawar, S Wang, M Azam Zia… - Wireless …, 2018 - Wiley Online Library
A huge amount of data, generated by Internet of Things (IoT), is growing up exponentially
based on nonstop operational states. Those IoT devices are generating an avalanche of …

A survey on secure data analytics in edge computing

D Liu, Z Yan, W Ding… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are
generated by IoT devices. Those data after analytics provide significant information that …

Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms

N Kaaniche, M Laurent - Computer Communications, 2017 - Elsevier
Recent technological advances have sparked the popularity and success of cloud. This new
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …