A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface
暂无分享,去创建一个
Mritunjay Kumar Rai | Rahul Saha | Joel J. P. C. Rodrigues | Tai-Hoon Kim | Reji Thomas | Gulshan Kumar | G. Geetha | J. Rodrigues | Tai-hoon Kim | G. Geetha | M. Rai | Gulshan Kumar | R. Saha | Reji Thomas
[1] Tie Qiu,et al. A Local-Optimization Emergency Scheduling Scheme With Self-Recovery for a Smart Grid , 2017, IEEE Transactions on Industrial Informatics.
[2] Man Ho Au,et al. Towards leakage-resilient fine-grained access control in fog computing , 2018, Future Gener. Comput. Syst..
[3] Martin R. Albrecht,et al. Large Modulus Ring-LWE ≥ Module-LWE , 2017, ASIACRYPT.
[4] Mahmoud Ammar,et al. Journal of Information Security and Applications , 2022 .
[5] François Gérard,et al. SETLA: Signature and Encryption from Lattices , 2018, CANS.
[6] Chris Peikert,et al. Lattice Cryptography for the Internet , 2014, PQCrypto.
[7] Sateesh Addepalli,et al. Fog computing and its role in the internet of things , 2012, MCC '12.
[8] Vahid Ashktorab,et al. Security Threats and Countermeasures in Cloud Computing , 2016 .
[9] Junbeom Hur,et al. Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing , 2018, Future Gener. Comput. Syst..
[10] Nadeem Javaid,et al. Fog Computing Over IoT: A Secure Deployment and Formal Verification , 2017, IEEE Access.
[11] Andrews Jeyaraj,et al. Recent security challenges in cloud computing , 2018, Comput. Electr. Eng..
[12] Songqing Chen,et al. FAST: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation , 2015, 2015 IEEE International Conference on Networking, Architecture and Storage (NAS).
[13] Hongwei Liu,et al. An efficient access control scheme with outsourcing capability and attribute update for fog computing , 2018, Future Gener. Comput. Syst..
[14] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[15] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[16] Tal Rabin,et al. Security for Signcryption: The Two-User Model , 2010, Practical Signcryption.
[17] Wenbin Yao,et al. Efficient Lattice-Based Signcryption in Standard Model , 2013 .
[18] Qun Li,et al. Fog Computing: Platform and Applications , 2015, 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).
[19] Marco R. Spruit,et al. Analysing the Security Risks of Cloud Adoption Using the SeCA Model: A Case Study , 2012, J. Univers. Comput. Sci..
[20] Rajkumar Buyya,et al. Fog Computing: Helping the Internet of Things Realize Its Potential , 2016, Computer.
[21] Vladimir Stantchev,et al. Smart Items, Fog and Cloud Computing as Enablers of Servitization in Healthcare , 2015 .
[22] Issa M. Khalil,et al. Cloud Computing Security: A Survey , 2014, Comput..
[23] W. Gareth J. Howells,et al. Integrating Feature Values for Key Generation in an ICmetric System , 2009, 2009 NASA/ESA Conference on Adaptive Hardware and Systems.
[24] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[25] Tie Qiu,et al. Survey on fog computing: architecture, key technologies, applications and open issues , 2017, J. Netw. Comput. Appl..
[26] MengChu Zhou,et al. Security and trust issues in Fog computing: A survey , 2018, Future Gener. Comput. Syst..
[27] Brij B. Gupta,et al. Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT , 2018, Sustain. Comput. Informatics Syst..
[28] Gareth Howells,et al. Integrating Multi-Modal Circuit Features within an Efficient Encryption System , 2007 .
[29] Jianhua Ma,et al. Cybermatics: Cyber-physical-social-thinking hyperspace based science and technology , 2016, Future Gener. Comput. Syst..
[30] Josep Domingo-Ferrer,et al. Anonymous and secure aggregation scheme in fog-based public cloud computing , 2018, Future Gener. Comput. Syst..
[31] Prasad Calyam,et al. Flexible IoT security middleware for end-to-end cloud-fog communication , 2018, Future Gener. Comput. Syst..
[32] Min Chen,et al. On the computation offloading at ad hoc cloudlet: architecture and service modes , 2015, IEEE Communications Magazine.
[33] Nan Zhang,et al. A security mechanism based on evolutionary game in fog computing , 2017, Saudi journal of biological sciences.
[34] P. Herbert Raj,et al. Exploring Data Security Issues and Solutions in Cloud Computing , 2018 .
[35] Athanasios V. Vasilakos,et al. Design of secure key management and user authentication scheme for fog computing services , 2019, Future Gener. Comput. Syst..
[36] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[37] Chirine Ghedira,et al. Cloud computing security taxonomy: From an atomistic to a holistic view , 2020, Future Gener. Comput. Syst..
[38] Mugen Peng,et al. Edge computing technologies for Internet of Things: a primer , 2017, Digit. Commun. Networks.
[39] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[40] Eui-Nam Huh,et al. Fog Computing: The Cloud-IoT\/IoE Middleware Paradigm , 2016, IEEE Potentials.
[41] Victor I. Chang,et al. A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments , 2018, Comput. Secur..
[42] Hicham Lakhlef,et al. Internet of things security: A top-down survey , 2018, Comput. Networks.
[43] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[44] Tie Qiu,et al. EABS: An Event-Aware Backpressure Scheduling Scheme for Emergency Internet of Things , 2018, IEEE Transactions on Mobile Computing.
[45] Jiangtao Li,et al. Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing , 2018, IEEE Access.
[46] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[47] Zhu Han,et al. Fog computing in multi-tier data center networks: A hierarchical game approach , 2016, 2016 IEEE International Conference on Communications (ICC).
[48] Jiguo Yu,et al. Cost-Efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks , 2017, IEEE Transactions on Vehicular Technology.
[49] Rahul Saha,et al. Symmetric random function generator (SRFG): A novel cryptographic primitive for designing fast and robust algorithms , 2017 .
[50] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[51] Yogesh L. Simmhan,et al. Demystifying Fog Computing: Characterizing Architectures, Applications and Abstractions , 2017, 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC).
[52] Young-Sik Jeong,et al. A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..