Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities

M Yahuza, MYIB Idris, AWBA Wahab, ATS Ho… - IEEE …, 2020 - ieeexplore.ieee.org
Edge computing is a promising paradigm that enhances the capabilities of cloud computing.
In order to continue patronizing the computing services, it is essential to conserve a good …

[HTML][HTML] A blockchain-based trust and reputation model with dynamic evaluation mechanism for IoT

Z Tu, H Zhou, K Li, H Song, Y Yang - Computer Networks, 2022 - Elsevier
The rapid development of the Internet of Things (IoT) has dramatically increased the number
of distributed IoT devices and users. Trust and Reputation Model (TRM) is a well-known …

CBiLSTM: A hybrid deep learning model for efficient reputation assessment of cloud services

R Al Saleh, M Driss, I Almomani - IEEE Access, 2022 - ieeexplore.ieee.org
The cloud market is characterized by fierce rivalry among cloud service providers. The
availability of various services with identical functionalities on the market complicates the …

Security and fairness in IoT based e-Health system: A case study of mobile edge-clouds

FN Nwebonyi, R Martins… - … Conference on Wireless …, 2019 - ieeexplore.ieee.org
Through IoT, humans and objects can be connected seamlessly, to guaranty improved
quality of service (QoS). IoT-driven e-Health systems benefit from such rich network setting …

Reliable data analysis through blockchain based crowdsourcing in mobile ad-hoc cloud

S Rasool, M Iqbal, T Dagiuklas, Z Ul-Qayyum… - Mobile Networks and …, 2020 - Springer
Abstract Mobile Ad-hoc Cloud (MAC) is the constellation of nearby mobile devices to serve
the heavy computational needs of the resource-constrained edge devices. One of the major …

Review of data integrity attacks and mitigation methods in edge computing

P Mahadevappa, RK Murugesan - … 2021, Penang, Malaysia, August 24–25 …, 2021 - Springer
In recent years, edge computing has emerged as a promising technology due to its unique
feature of real-time computing and parallel processing. They provide computing and storage …

[PDF][PDF] RESEARCH ON SECURE OFFLOADING OF EDGE COMPUTING FOR TRAFFIC VIDEO SURVEILLANCE

J Liu, X Shi, J Liu, X Tu - … Journal of Innovative Computing, Information and …, 2024 - ijicic.org
To address the problems of how to resist internal attacks caused by offloading traffic
surveillance video processing tasks to the edge cloud and how to reasonably allocate edge …

[PDF][PDF] Gaussian Flower Pollination Optimization Based Trusted Service Selection for Cloud Computing Environment.

S Priya, RS Ponmagal - International Journal of Intelligent Engineering & …, 2024 - inass.org
As cloud computing is a combination of variety of technologies, there are a number of
security concerns need to be addressed. To protect from various attacks and to improve the …

[PDF][PDF] Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities

AZB TAHA - academia.edu
Edge computing is a promising paradigm that enhances the capabilities of cloud computing.
In order to continue patronizing the computing services, it is essential to conserve a good …

[PDF][PDF] Northumbria Research Link

TS Anthony, S Khan, SNB Musa, AZB Taha - core.ac.uk
Edge computing is a promising paradigm that enhances the capabilities of cloud computing.
In order to continue patronizing the computing services, it is essential to conserve a good …