[HTML][HTML] All one needs to know about fog computing and related edge computing paradigms: A complete survey

A Yousefpour, C Fung, T Nguyen, K Kadiyala… - Journal of Systems …, 2019 - Elsevier
Abstract With the Internet of Things (IoT) becoming part of our daily life and our environment,
we expect rapid growth in the number of connected devices. IoT is expected to connect …

Data security and privacy protection for cloud storage: A survey

P Yang, N Xiong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …

A survey on IoT security: application areas, security threats, and solution architectures

V Hassija, V Chamola, V Saxena, D Jain, P Goyal… - IEEe …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects
can be empowered to create, receive, and exchange data in a seamless manner. Various …

Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Security and trust issues in fog computing: A survey

PY Zhang, MC Zhou, G Fortino - Future Generation Computer Systems, 2018 - Elsevier
Fog computing uses one or more collaborative end users or near-user edge devices to
perform storage, communication, control, configuration, measurement and management …

A survey on secure data analytics in edge computing

D Liu, Z Yan, W Ding… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are
generated by IoT devices. Those data after analytics provide significant information that …

[HTML][HTML] A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues

ASM Kayes, R Kalaria, IH Sarker, MS Islam, PA Watters… - Sensors, 2020 - mdpi.com
Over the last few decades, the proliferation of the Internet of Things (IoT) has produced an
overwhelming flow of data and services, which has shifted the access control paradigm from …

Security in Internet of Things: A review

NA Khan, A Awang, SAA Karim - IEEE access, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is the paramount virtual network that enables remote users to access
connected multimedia devices. It has dragged the attention of the community because it …

A privacy-preserving data aggregation scheme for dynamic groups in fog computing

X Shen, L Zhu, C Xu, K Sharif, R Lu - Information Sciences, 2020 - Elsevier
Fog computing has garnered significant attention in recent years, since it can bridge the
cloud and terminal devices and provide low latency, location awareness, and geo …

[HTML][HTML] Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control

AAN Patwary, RK Naha, S Garg, SK Battula… - Electronics, 2021 - mdpi.com
Fog computing is an emerging computing paradigm that has come into consideration for the
deployment of Internet of Things (IoT) applications amongst researchers and technology …