BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture
暂无分享,去创建一个
Rajkumar Buyya | Md Whaiduzzaman | Colin Fidge | Md. Julkar Nayeen Mahi | Alistair Barros | Md. Ibrahim Khalil | C. Fidge | R. Buyya | Md Whaiduzzaman | A. Barros | Md.Ibrahim Khalil | Md. Whaiduzzaman
[1] Haipeng Yao,et al. Resource Trading in Blockchain-Based Industrial Internet of Things , 2019, IEEE Transactions on Industrial Informatics.
[2] Nor Badrul Anuar,et al. Cloud Service Selection Using Multicriteria Decision Analysis , 2014, TheScientificWorldJournal.
[3] M. Shamim Hossain,et al. A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography , 2017, IEEE Access.
[4] Shau-Yin Tseng,et al. Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.
[5] Hiroki Watanabe,et al. The Blockchain-Based Digital Content Distribution System , 2015, 2015 IEEE Fifth International Conference on Big Data and Cloud Computing.
[6] J. Enrique Muñoz Expósito,et al. Smart Containers Schedulers for Microservices Provision in Cloud-Fog-IoT Networks. Challenges and Opportunities , 2020, Sensors.
[7] Md Whaiduzzaman,et al. Credit Based Task Scheduling Process Management in Fog Computing , 2020, PACIS.
[8] Dezhi Han,et al. Fabric-iot: A Blockchain-Based Access Control System in IoT , 2020, IEEE Access.
[9] Ivan Stojmenovic,et al. An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..
[10] Abdullah Gani,et al. A Study on Strategic Provisioning of Cloud Computing Services , 2014, TheScientificWorldJournal.
[11] Tu Peng,et al. Implementation of High-Performance Blockchain Network Based on Cross-Chain Technology for IoT Applications , 2020, Sensors.
[12] Jing He,et al. Security in Fog Computing through Encryption , 2016 .
[13] Ifeyinwa E. Achumba,et al. Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology , 2017, J. Electr. Comput. Eng..
[14] Antonio Ortega,et al. Grasp: A matlab toolbox for graph signal processing , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[15] Abdullah Gani,et al. MobiCoRE: Mobile Device Based Cloudlet Resource Enhancement for Optimal Task Response , 2018, IEEE Transactions on Services Computing.
[16] Agostino Cortesi,et al. A Hierarchical and Abstraction-Based Blockchain Model , 2019, Applied Sciences.
[17] Biswaraj Sen,et al. Design and Simulation of Wireless Sensor Network in NS2 , 2015 .
[18] Guojun Wang,et al. Resource Management in a Peer to Peer Cloud Network for IoT , 2020, Wireless Personal Communications.
[19] Xin Zhou,et al. Research and implementation of RSA algorithm for encryption and decryption , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.
[20] David Hutchison,et al. Fog computing systems: State of the art, research issues and future trends, with a focus on resilience , 2020, J. Netw. Comput. Appl..
[21] Matthias Dehmer,et al. NETWORK COMPLEXITY MEASURES. AN INFORMATION-THEORETIC APPROACH , 2015 .
[22] Rajkumar Buyya,et al. A scheduling-based dynamic fog computing framework for augmenting resource utilization , 2021, Simul. Model. Pract. Theory.
[23] Alexandru Stanciu,et al. Blockchain Based Distributed Control System for Edge Computing , 2017, 2017 21st International Conference on Control Systems and Computer Science (CSCS).
[24] Hector Zenil,et al. A Review of Graph and Network Complexity from an Algorithmic Information Perspective , 2018, Entropy.
[25] Md Torikur Rahman,et al. Proposal for SZRP protocol with the establishment of the salted SHA-256 Bit HMAC PBKDF2 advance security system in a MANET , 2014, 2014 International Conference on Electrical Engineering and Information & Communication Technology.
[26] Guisheng Fan,et al. Contract-Based Resource Sharing for Time Effective Task Scheduling in Fog-Cloud Environment , 2020, IEEE Transactions on Network and Service Management.
[27] Sachchidanand Singh,et al. Blockchain: Future of financial and cyber security , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).
[28] Alistair Barros,et al. AUASF: An Anonymous Users Authentication Scheme for Fog-IoT Environment , 2020, 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[29] Madini O. Alassafi,et al. Blockchain with Internet of Things: Benefits, Challenges, and Future Directions , 2018, International Journal of Intelligent Systems and Applications.
[30] Shanto Roy,et al. A RESTful E-Governance Application Framework for People Identity Verification in Cloud , 2018, CLOUD.
[31] Kun Yang,et al. Securing SDN-Controlled IoT Networks Through Edge Blockchain , 2021, IEEE Internet of Things Journal.
[32] Qun Li,et al. Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.
[33] Simon Parkinson,et al. Fog computing security: a review of current applications and security solutions , 2017, Journal of Cloud Computing.
[34] Rajkumar Buyya,et al. Network-centric performance analysis of runtime application migration in mobile cloud computing , 2015, Simul. Model. Pract. Theory.
[35] Juan Boubeta-Puig,et al. Real-Time Context-Aware Microservice Architecture for Predictive Analytics and Smart Decision-Making , 2019, IEEE Access.
[36] Jun Li,et al. Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM , 2018, IEEE Communications Magazine.
[37] Eklas Hossain,et al. Authentication Protocol for Cloud Databases Using Blockchain Mechanism , 2019, Sensors.
[38] R Kiran Kumar,et al. A survey on conventional encryption algorithms of Cryptography , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).
[39] Jims Marchang,et al. IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN , 2020, IET Inf. Secur..
[40] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[41] Teng Zhang,et al. A study of DES and Blowfish encryption algorithm , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.
[42] Arwa Alrawais,et al. An Attribute-Based Encryption Scheme to Secure Fog Communications , 2017, IEEE Access.
[43] Wei-Meng Lee. Implementing Your Own Blockchain Using Python , 2019 .
[44] Prerna Mahajan,et al. A Study of Encryption Algorithms AES, DES and RSA for Security , 2013 .
[45] Roberto Baldoni,et al. Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments , 2017, ITASEC.
[46] Erik Blasch,et al. BlendMAS: A Blockchain-Enabled Decentralized Microservices Architecture for Smart Public Safety , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).
[47] Iuon-Chang Lin,et al. A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..
[48] Md Whaiduzzaman,et al. An Identity-Based Encryption Scheme for Data Security in Fog Computing , 2018, IJCCI.
[49] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..