A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, mobile edge computing, fog computing, and cloudlet
Sending data to the cloud for analysis was a prominent trend during the past decades,
driving cloud computing as a dominant computing paradigm. However, the dramatically …
driving cloud computing as a dominant computing paradigm. However, the dramatically …
Edge-computing-enabled smart cities: A comprehensive survey
Recent years have disclosed a remarkable proliferation of compute-intensive applications in
smart cities. Such applications continuously generate enormous amounts of data which …
smart cities. Such applications continuously generate enormous amounts of data which …
Data security and privacy-preserving in edge computing paradigm: Survey and open issues
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …
edge of the network, the traditional centralized cloud computing model has come to a …
Security and trust issues in fog computing: A survey
Fog computing uses one or more collaborative end users or near-user edge devices to
perform storage, communication, control, configuration, measurement and management …
perform storage, communication, control, configuration, measurement and management …
From cloud to fog computing: A review and a conceptual live VM migration framework
Fog computing, an extension of cloud computing services to the edge of the network to
decrease latency and network congestion, is a relatively recent research trend. Although …
decrease latency and network congestion, is a relatively recent research trend. Although …
An efficient task scheduling approach using moth‐flame optimization algorithm for cyber‐physical system applications in fog computing
With the rapid development of in modern technologies has led to a novel generation of
cyberspace equipment and secure analysis methods such as cyber‐physical system (CPS) …
cyberspace equipment and secure analysis methods such as cyber‐physical system (CPS) …
Attribute based encryption with privacy protection and accountability for CloudIoT
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems
a very challenging task. More so when access and storage are performed through a cloud …
a very challenging task. More so when access and storage are performed through a cloud …
Fog computing: An overview of big IoT data analytics
A huge amount of data, generated by Internet of Things (IoT), is growing up exponentially
based on nonstop operational states. Those IoT devices are generating an avalanche of …
based on nonstop operational states. Those IoT devices are generating an avalanche of …
A survey on secure data analytics in edge computing
Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are
generated by IoT devices. Those data after analytics provide significant information that …
generated by IoT devices. Those data after analytics provide significant information that …
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
Recent technological advances have sparked the popularity and success of cloud. This new
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …
paradigm is gaining an expanding interest, since it provides cost efficient architectures that …