A survey from real-time to near real-time applications in fog computing environments

E Gomes, F Costa, C De Rolt, P Plentz, M Dantas - Telecom, 2021 - mdpi.com
In this article, we present a comprehensive survey on time-sensitive applications
implemented in fog computing environments. The goal is to research what applications are …

A personalized privacy protection framework for mobile crowdsensing in IIoT

J **ong, R Ma, L Chen, Y Tian, Q Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the rapid digitalization of various industries, mobile crowdsensing (MCS), an intelligent
data collection and processing paradigm of the industrial Internet of Things, has provided a …

Smart and practical privacy-preserving data aggregation for fog-based smart grids

S Zhao, F Li, H Li, R Lu, S Ren, H Bao… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
With the increasingly powerful and extensive deployment of edge devices, edge/fog
computing enables customers to manage and analyze data locally, and extends computing …

A review of evolutionary trends in cloud computing and applications to the healthcare ecosystem

MJ Molo, JA Badejo, E Adetiba… - … Intelligence and Soft …, 2021 - Wiley Online Library
Cloud computing is a technology that allows dynamic and flexible computing capability and
storage through on‐demand delivery and pay‐as‐you‐go services over the Internet. This …

Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system

X An, J Su, X Lü, F Lin - EURASIP Journal on Wireless Communications …, 2018 - Springer
The birth of fog computing has given rise to many security threats. Distributed denial of
service (DDoS) attacks by intruders on fog nodes will cause system resources to be illegally …

Efficient data transfer in edge envisioned environment using artificial intelligence based edge node algorithm

VDA Kumar, A Kumar, RS Batth… - Transactions on …, 2021 - Wiley Online Library
Edge computing technology has drawn the keystone of future intelligent transportation
systems, especially in smart cities, because of processing data that are near to the user …

Privacy-preserving fog aggregation of smart grid data using dynamic differentially-private data perturbation

F Kserawi, S Al-Marri, Q Malluhi - IEEE Access, 2022 - ieeexplore.ieee.org
The edge of the smart grid has a massive number of power and resource-constrained
interconnected devices. Mainly, smart meters report power consumption data from consumer …

Analysis on homomorphic technique for data security in fog computing

A Murugesan, B Saminathan… - Transactions on …, 2021 - Wiley Online Library
The fog computing model has given new trends of networking with different types of devices
providing services at the end‐user point. It inherits most advanced features of cloud …

Query privacy preserving for data aggregation in wireless sensor networks

X Liu, X Zhang, J Yu, C Fu - Wireless Communications and …, 2020 - Wiley Online Library
Wireless Sensor Networks (WSNs) are increasingly involved in many applications. However,
communication overhead and energy efficiency of sensor nodes are the major concerns in …

Approximate data aggregation in sensor equipped IoT networks

J Li, M Siddula, X Cheng, W Cheng… - Tsinghua Science and …, 2019 - ieeexplore.ieee.org
As Internet-of-Things (IoT) networks provide efficient ways to transfer data, they are used
widely in data sensing applications. These applications can further include wireless sensor …