A survey on secure data analytics in edge computing

D Liu, Z Yan, W Ding… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
… In this part, we review secure data transmission schemes in edge computing. With the
purpose of achieving the secure communications between fog nodes and cloud server, Alrawais …

Secure edge computing in IoT systems: Review and case studies

M Alrowaily, Z Lu - … IEEE/ACM symposium on edge computing  …, 2018 - ieeexplore.ieee.org
… of IoT empowered secure edge computing. • Architecture and security issues: We review
the architecture of IoT systems in edge computing. Edge computing offers minimized latency …

Secure mobile edge computing networks in the presence of multiple eavesdroppers

X Lai, L Fan, X Lei, Y Deng… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
… the local computing and the offloading of confidential data as well as the edge computing
can … between the latency of local computing and the latency of offloading as well as the edge

Secure communications for UAV-enabled mobile edge computing systems

Y Zhou, C Pan, PL Yeoh, K Wang… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
computing capacity constraints and reduce transmission and computing latencies, mobile
edge computing … for providing high-capacity computing resources at the network edge [16]–[18]…

A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing

T Wang, G Zhang, A Liu… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Edge computing may present a more advantageous … ; edge computing is an affordable and
sustainable computing paradigm to provide many services [30], [31]. For the design, the edge

AI-enabled secure microservices in edge computing: Opportunities and challenges

F Al-Doghman, N Moustafa, I Khalil… - … Services Computing, 2022 - ieeexplore.ieee.org
… at IoT edge. We also propose a Microservices-based edge computing framework that provides
secure edge AI … to offer automated and secure AI-based applications at the network edge. …

Energy-efficient computation offloading for secure UAV-edge-computing systems

T Bai, J Wang, Y Ren, L Hanzo - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Edge-Computing Model As for edge computing, we use DE and CE to represent the … tasks
of minimal volume, hence the edge computing node is capable of executing the computations …

[PDF][PDF] Secure Edge Computing with ARM TrustZone.

R Pettersen, HD Johansen, D Johansen - IoTBDS, 2017 - scitepress.org
… When connecting Internet of Things (IOT) devices and other Internet edge computers to … to
architect a secure and integrated middleware system spanning from IOT edge devices to back-…

Secure UAV-aided mobile edge computing for IoT: A review

ET Michailidis, K Maliatsos, DN Skoutas… - IEEE …, 2022 - ieeexplore.ieee.org
… The integration of these networks into B5G networks and Industry 5.0 was also discussed as
an extension of cloud computing and edge computing, emerging use cases were described, …

Deep learning for secure mobile edge computing

Y Chen, Y Zhang, S Maharjan - arXiv preprint arXiv:1709.08025, 2017 - arxiv.org
edge network itself, are also becoming serious concerns. For instance, when an edge customer
connects with the closest edge computingedge computing device stored with the edge