Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges

R Roman, J Lopez, M Mambo - Future Generation Computer Systems, 2018 - Elsevier
For various reasons, the cloud computing paradigm is unable to meet certain requirements
(eg low latency and jitter, context awareness, mobility support) that are crucial for several …

A survey of virtual machine management in edge computing

Z Tao, Q **a, Z Hao, C Li, L Ma, S Yi… - Proceedings of the …, 2019 - ieeexplore.ieee.org
Many edge computing systems rely on virtual machines (VMs) to deliver their services. It is
challenging, however, to deploy the virtualization mechanisms on edge computing hardware …

[PDF][PDF] International journal of advanced research in computer science and software engineering

AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …

A multi-property method to evaluate trust of edge computing based on data driven capsule network

C Jia, K Lin, J Deng - IEEE INFOCOM 2020-IEEE Conference …, 2020 - ieeexplore.ieee.org
As one of the computing paradigms in the process of traditional cloud computing turning to
marginalization, edge computing is designed to meet the requirements of edge devices such …

Trusted path between two entities in Cloud

U Divakarla, K Chandrasekaran - 2016 6th International …, 2016 - ieeexplore.ieee.org
Trust plays an important role in the security of resources of the emerging technology called
Cloud. To develop a strong trust there has to be a strong trust path between two entities. In …

Fog computing in Internet of Things-based E-health system—challenges and opportunities for managing health-associated data

M Maksimovic - Handbook of e-Business Security, 2018 - taylorfrancis.com
This chapter represents the essence of Internet of Things (IoT)-supported healthcare, lists
the types and structures of health-related data, and considers and analyzes the present …

移动边缘计算安全防御研究

陈璐, 汤红波, 游伟, 柏溢 - 网络与信息安全学报, 2021 - infocomm-journal.com
移动边缘计算(Mobile Edge Computing, MEC) 通过进一步将电信蜂窝网延伸至其他无线接入
网络, 可以有效地解决传统网络中回程链路负载过重, 时延较长的问题. 但由于MEC …

[PDF][PDF] Secure allocation of resources in cloud using trust

U Divakarla, K Chandrasekaran - International Journal of Computer …, 2016 - mecs-press.org
Cloud is the recent emerging technology in all aspects. The basic concern with the usage of
this Cloud Technology is security. Security poses a major drawback with data storage …

[PDF][PDF] 클라우드 연합 형성: 기관 신뢰도와 분산 신뢰도 평가를 통한 요인, 요구사항, 과제및 현재 동향 지원

WY Gebrealif - 2023 - s-space.snu.ac.kr
저작자표시-비영리-변경금지 2.0 대한민국 이용자는 아래의 조건을 따르는 경우에 한하여 자유롭
Page 1 저작자표시-비영리-변경금지 2.0 대한민국 이용자는 아래의 조건을 따르는 경우에 한하여 …

[PDF][PDF] Community Cloud: an Infrastructure Solution for a Logistics Project

MT Baldassarre, N Boffoli, D Caivano… - … on Information Science …, 2015 - wseas.com
Cloud computing is becoming more and more adopted as infrastructure for providing service
oriented solutions. Such a solution is especially critical when software and hardware …