A Privacy Preserving Model for Fog-enabled MCC systems using 5G Connection
暂无分享,去创建一个
[1] Marimuthu Palaniswami,et al. PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid , 2018, IEEE Transactions on Industrial Informatics.
[2] Shantanu Sharma,et al. A survey on 5G: The next generation of mobile communication , 2015, Phys. Commun..
[3] Xianbin Wang,et al. Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.
[4] Mauro Conti,et al. A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.
[5] Song Guo,et al. A Differential Privacy-Based Query Model for Sustainable Fog Data Centers , 2019, IEEE Transactions on Sustainable Computing.
[6] Mats Näslund,et al. Subscription identifier privacy in 5G systems , 2017, 2017 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT).
[7] A Khalid. Privacy and Security Problems in Fog Computing , 2016 .
[8] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[9] Geetha Kurikala,et al. Fog Computing : Implementation of Security and Privacy to Comprehensive Approach for Avoiding Knowledge Thieving Attack Exploitation Decoy Technology , 2017 .
[10] Yonghong Chen,et al. Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services , 2017, IEEE Access.
[11] T. Noble Foster,et al. Navigating Through the Fog of Cloud Computing Contracts, 30 J. Marshall J. Info. Tech. & Privacy L.13 (2013) , 2013 .
[12] T Veerraju,et al. A survey on fog computing: research challenges in security and privacy issues , 2018 .
[13] Hyunjae Nam,et al. Security and Privacy Issues of Fog Computing , 2017 .
[14] Lene Tolstrup Sørensen,et al. Introduction to the Minitrack on Privacy, 5G and Economics , 2018, HICSS.
[15] Edward Roback,et al. SP 800-12. An Introduction to Computer Security: the NIST Handbook , 1995 .
[16] Knud Erik Skouby,et al. Privacy and Economics in a 5G Environment , 2017, Wirel. Pers. Commun..
[17] Andrey Brito,et al. Lightweight privacy for smart metering data by adding noise , 2014, SAC.
[18] Imane Aly Saroit,et al. Secure and privacy-preserving AMI-utility communications via LTE-A networks , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[19] Arun Kumar Sangaiah,et al. Cognitive Computing for Big Data Systems Over IoT , 2018 .
[20] Arpan Kumar Kar,et al. Critical Success Factors to Establish 5G Network in Smart Cities: Inputs for Security and Privacy , 2017, J. Glob. Inf. Manag..
[21] Aiqing Zhang,et al. Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing , 2017, IEEE Communications Magazine.
[22] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[23] Athanasios V. Vasilakos,et al. Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..
[24] Erman Ayday,et al. Privacy-preserving fog computing paradigm , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).
[25] Neha Shrikant Dhande,et al. FOG COMPUTING: REVIEW OF PRIVACY AND SECURITY ISSUES , 2015 .
[26] Hao Wang,et al. Position based cryptography with location privacy: A step for Fog Computing , 2018, Future Gener. Comput. Syst..
[27] Y. Krishnaveni,et al. A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing , 2018 .
[28] Ragib Hasan,et al. Towards an Analysis of the Architecture, Security, and Privacy Issues in Vehicular Fog Computing , 2019, 2019 SoutheastCon.
[29] Mohamed Amine Ferrag,et al. Privacy-preserving Schemes for Fog-based IoT Applications: Threat models, Solutions, and Challenges , 2018, 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT).
[30] Antonios Argyriou,et al. Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..
[31] Irp India. Literature review: Cloud Computing –Security Issues, Solution and Technologies , 2014 .
[32] Qun Li,et al. Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.
[33] Younghan Kim,et al. Gap analysis for adapting the distributed mobility management model in 4G/5G mobile networks , 2017, 2017 IEEE Conference on Network Softwarization (NetSoft).
[34] Raimo Kantola,et al. Heterogeneous Data Access Control based on Trust and Reputation in Mobile Cloud Computing , 2017 .
[35] Roch H. Glitho,et al. A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges , 2017, IEEE Communications Surveys & Tutorials.
[37] Elfed Lewis,et al. FPGA based Real time 'secure' body temperature monitoring suitable for WBSN 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing , 2015 .
[38] Sz. Varadi,et al. Legal Issues of Social IoT Services: The Effects of Using Clouds, Fogs and AI , 2020 .