Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …

Architectural design alternatives based on cloud/edge/fog computing for connected vehicles

H Wang, T Liu, BG Kim, CW Lin… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
As vehicles playing an increasingly important role in people's daily life, requirements on
safer and more comfortable driving experience have arisen. Connected vehicles (CVs) can …

Vehicular edge computing and networking: A survey

L Liu, C Chen, Q Pei, S Maharjan, Y Zhang - Mobile networks and …, 2021 - Springer
As one key enabler of Intelligent Transportation System (ITS), Vehicular Ad Hoc Network
(VANET) has received remarkable interest from academia and industry. The emerging …

A survey on mobile edge networks: Convergence of computing, caching and communications

S Wang, X Zhang, Y Zhang, L Wang, J Yang… - Ieee …, 2017 - ieeexplore.ieee.org
As the explosive growth of smart devices and the advent of many new applications, traffic
volume has been growing exponentially. The traditional centralized network architecture …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Towards the decentralised cloud: Survey on approaches and challenges for mobile, ad hoc, and edge computing

AJ Ferrer, JM Marquès, J Jorba - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Cloud computing emerged as a centralised paradigm that made “infinite” computing
resources available on demand. Nevertheless, the ever-increasing computing capacities …

Security and privacy challenges in mobile cloud computing: Survey and way ahead

MB Mollah, MAK Azad, A Vasilakos - Journal of Network and Computer …, 2017 - Elsevier
The rapid growth of mobile computing is seriously challenged by the resource constrained
mobile devices. However, the growth of mobile computing can be enhanced by integrating …

Blockchain technology the identity management and authentication service disruptor: a survey

SY Lim, PT Fotsing, A Almasri… - International …, 2018 - researchportal.hw.ac.uk
The Internet today lacks an identity protocol for identifying people and organizations. As a
result, service providers needed to build and maintain their own databases of user …

Mobile cloud computing: Challenges and future research directions

TH Noor, S Zeadally, A Alfazi, QZ Sheng - Journal of Network and …, 2018 - Elsevier
Mobile cloud computing promises several benefits such as extra battery life and storage,
scalability, and reliability. However, there are still challenges that must be addressed in …

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service

S Iqbal, MLM Kiah, B Dhaghighi, M Hussain… - Journal of Network and …, 2016 - Elsevier
Major provisioning of cloud computing is mainly delivered via Software as a Service,
Platform as a Service and Infrastructure as a Service. However, these service delivery …