Design of secure key management and user authentication scheme for fog computing services

M Wazid, AK Das, N Kumar, AV Vasilakos - Future Generation Computer …, 2019 - Elsevier
… of a user authentication protocol for fog computing services. The following important attacks
need to be protected in a user authentication protocol designed for fog computing services: …

The fog computing service for healthcare

Y Shi, G Ding, H Wang, HE Roman… - 2015 2nd International …, 2015 - ieeexplore.ieee.org
… The primary objective of fog computing is to ensure the low and predictable latency … services.
This paper discusses the characteristics of fog computing and services that fog computing

A trust management system for fog computing services

SO Ogundoyin, IA Kamil - Internet of Things, 2021 - Elsevier
… two-tier requirements of trust management in fog computing environment. More importantly,
fog computing services which considers both client-to-fog secure offloading and fog-to-fog

A survey of optimization algorithms for fog computing service placement

MS Raghavendra, P Chawla… - 2020 8th international …, 2020 - ieeexplore.ieee.org
SERVICE PLACEMENT AND ALGORITHMS The mutual deployment of fog and cloud brings
amazing advantages. In accordance with this, fog computing environment as an effective …

Fog computing architecture, evaluation, and future research directions

M Aazam, S Zeadally, KA Harras - IEEE Communications …, 2018 - ieeexplore.ieee.org
… ’s processing delay, and we analyze the extent to which fog can be applied. The major …
fog computing through a detailed architecture. • We compare the cloud and fog computing

Fog computing service in the healthcare monitoring system for managing the real‐time notification

A Elhadad, F Alanazi, AI Taloba… - Journal of Healthcare …, 2022 - Wiley Online Library
fog computing is being developed to speed up the services for … This new computing platform,
based on the fog computing … benefits of choosing fog computing services in healthcare …

A survey of fog computing: concepts, applications and issues

S Yi, C Li, Q Li - Proceedings of the 2015 workshop on mobile big data, 2015 - dl.acm.org
… It is also interesting that how we dynamically do pricing in fog computing services to
maximize revenue and utilization, just like what traditional industrialise do in airline ticketing, car …

Forch: An orchestrator for fog computing service deployment

G Davoli, D Borsatti, D Tarchi… - 2020 IFIP Networking …, 2020 - ieeexplore.ieee.org
Service (XaaS) closer to the end user, reducing both serviceservice model-aware Fog
Computing orchestrator to dynamically allocate services and manage resources available on Fog

A clogging resistant secure authentication scheme for fog computing services

Z Ali, SA Chaudhry, K Mahmood, S Garg, Z Lv… - Computer Networks, 2021 - Elsevier
… Since fog computing is an augmentation of cloud computing, and various security checks …
still, fog computing bears numerous privacy and security issues of cloud computing, causing …

A Fuzzy-AHP based prioritization of trust criteria in fog computing services

SO Ogundoyin, IA Kamil - Applied Soft Computing, 2020 - Elsevier
… model that would be beneficial to both fog computing service provider and end users. With
… generalized framework for decision-making in fog computing services. Specifically, the main …