Fog computing security and privacy for the Internet of Thing applications: State‐of‐the‐art
暂无分享,去创建一个
Yehia Ibrahim Alzoubi | Ashraf Jaradat | Valmira H. Osmanaj | Ahmad Al-Ahmad | Y. Alzoubi | A. Al-Ahmad | Ashraf Jaradat
[1] Jiyue Huang,et al. Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing , 2020, IEEE Transactions on Services Computing.
[2] Jun Shao,et al. Data Security and Privacy in Fog Computing , 2018, IEEE Network.
[3] Yingwei Wang. A Blockchain System with Lightweight Full Node Based on Dew Computing , 2020, Internet Things.
[4] Francesco Chiti,et al. An integrated framework for blockchain inspired fog communications and computing in internet of vehicles , 2020, J. Ambient Intell. Humaniz. Comput..
[5] Khaled Salah,et al. IoT Public Fog Nodes Reputation System: A Decentralized Solution Using Ethereum Blockchain , 2019, IEEE Access.
[6] Lei Shu,et al. Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges , 2020, IEEE Access.
[7] Muhammad Rizwan,et al. Securing Cognitive Radio Vehicular Ad Hoc Network with Fog Node based Distributed Blockchain Cloud Architecture , 2019, International Journal of Advanced Computer Science and Applications.
[8] Zhihui Lu,et al. Smart-toy-edge-computing-oriented data exchange based on blockchain , 2018, J. Syst. Archit..
[9] Zhu Han,et al. Cloud/Fog Computing Resource Management and Pricing for Blockchain Networks , 2017, IEEE Internet of Things Journal.
[10] Abdul Nasir Khan,et al. A survey on privacy and access control schemes in fog computing , 2019, Int. J. Commun. Syst..
[11] Jabeen Sultana,et al. Intrusion Detection Based on Autoencoder and Isolation Forest in Fog Computing , 2020, IEEE Access.
[12] Bhabendu Kumar Mohanta,et al. Blockchain technology: A survey on applications and security privacy Challenges , 2019, Internet Things.
[13] Nor Badrul Anuar,et al. Performance and Security Challenges Digital Rights Management (DRM) Approaches Using Fog Computing for Data Provenance: A Survey , 2020 .
[14] MOHAMMAD AHSAN CHISHTI,et al. Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree Solutions: A Review , 2020, Scalable Comput. Pract. Exp..
[15] Kim-Kwang Raymond Choo,et al. Blockchain in healthcare applications: Research challenges and opportunities , 2019, J. Netw. Comput. Appl..
[16] Yan Leng,et al. Secure data storage based on blockchain and coding in edge computing. , 2019, Mathematical biosciences and engineering : MBE.
[17] Gustavo Caiza,et al. Fog computing at industrial level, architecture, latency, energy, and security: A review , 2020, Heliyon.
[18] Ashok Kumar Das,et al. Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment , 2020, IEEE Transactions on Industrial Informatics.
[19] Lei Shu,et al. Securing parked vehicle assisted fog computing with blockchain and optimal smart contract design , 2020, IEEE/CAA Journal of Automatica Sinica.
[20] S. Bharath Bhushan,et al. Security Issues in Fog Computing for Internet of Things , 2020 .
[21] Tiago M. Fernández-Caramés,et al. Towards Next Generation Teaching, Learning, and Context-Aware Applications for Higher Education: A Review on Blockchain, IoT, Fog and Edge Computing Enabled Smart Campuses and Universities , 2019, Applied Sciences.
[22] Yong Xiang,et al. Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing , 2020, IEEE Internet of Things Journal.
[23] Jianfeng Ma,et al. Building a Secure Scheme for a Trusted Hardware Sharing Environment , 2017, IEEE Access.
[24] Haruna Chiroma,et al. Security challenges in fog-computing environment: a systematic appraisal of current developments , 2019, Journal of Reliable Intelligent Environments.
[25] Mohamed Abid,et al. Secure Fog-Based E-Learning Scheme , 2020, IEEE Access.
[26] Keke Gai,et al. Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks , 2019, IEEE Internet of Things Journal.
[27] Haonan An,et al. Security Enhancement on a Lightweight Authentication Scheme With Anonymity Fog Computing Architecture , 2020, IEEE Access.
[28] Muhammad Imran,et al. Security and Privacy Issues in Fog Computing , 2020 .
[29] Michael Losavio,et al. Fog Computing, Edge Computing and a return to privacy and personal autonomy , 2020 .
[30] Hanan Elazhary,et al. Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions , 2019, J. Netw. Comput. Appl..
[31] Patrícia R. Sousa,et al. The Present and Future of Privacy-Preserving Computation in Fog Computing , 2018 .
[32] Khaled Salah,et al. Monetization of Services Provided by Public Fog Nodes Using Blockchain and Smart Contracts , 2020, IEEE Access.
[33] Mustafa Al-Fayoumi,et al. Fog Computing: Security Challenges and Countermeasures , 2020, International Journal of Computer Applications.
[34] P. Roose,et al. SMART FOG COMPUTING FOR EFFICIENT SITUATIONS MANAGEMENT IN SMART HEALTH ENVIRONMENTS , 2018, Journal of Information and Communication Technology.
[35] Ke Xu,et al. Toward Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks , 2020, IEEE Network.
[36] Victor C. M. Leung,et al. Distributed Resource Allocation in Blockchain-Based Video Streaming Systems With Mobile Edge Computing , 2019, IEEE Transactions on Wireless Communications.
[37] Rui Guo,et al. A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing , 2020, Int. J. Distributed Sens. Networks.
[38] Asad Waqar Malik,et al. Blockchain-Based Reputation Management for Task Offloading in Micro-Level Vehicular Fog Network , 2020, IEEE Access.
[39] Jing Zhou,et al. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment , 2017, Sensors.
[40] Mohammad S. Obaidat,et al. An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map , 2020, J. Inf. Secur. Appl..
[41] Mu-En Wu,et al. A secure authenticated and key exchange scheme for fog computing , 2020, Enterp. Inf. Syst..
[42] Mohamed Amine Ferrag,et al. Security and Privacy Issues and Solutions for Fog , 2020, Fog and Fogonomics.
[43] R. Ganesh Babu,et al. Fog Computing using Interoperability and IoT Security Issues in Health Care , 2020 .
[44] Xenofon Fafoutis,et al. A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities , 2020, IEEE Communications Surveys & Tutorials.
[45] Ekram Hossain,et al. A Blockchain Framework for Secure Task Sharing in Multi-Access Edge Computing , 2020, IEEE Network.
[46] Zhu Han,et al. A Machine-Learning-Based Auction for Resource Trading in Fog Computing , 2020, IEEE Communications Magazine.
[47] Keke Gai,et al. Privacy-Aware Efficient Fine-Grained Data Access Control in Internet of Medical Things Based Fog Computing , 2018, IEEE Access.
[48] Qinglei Kong,et al. Achieving Privacy-Preserving and Verifiable Data Sharing in Vehicular Fog With Blockchain , 2021, IEEE Transactions on Intelligent Transportation Systems.
[49] Fadi Al-Turjman,et al. Enhancing the Access Privacy of IDaaS System Using SAML Protocol in Fog Computing , 2020, IEEE Access.
[50] P. Prakash,et al. Fog Computing: Issues, Challenges and Future Directions , 2017 .
[51] 十河茂幸. Securing Communication between Fog Computing and IoT Using Constrained Application Protocol (CoAP): A Survey , 2020 .