Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges

R Roman, J Lopez, M Mambo - Future Generation Computer Systems, 2018 - Elsevier
For various reasons, the cloud computing paradigm is unable to meet certain requirements
(eg low latency and jitter, context awareness, mobility support) that are crucial for several …

A survey on access control mechanisms for cloud computing

R El Sibai, N Gemayel, J Bou Abdo… - Transactions on …, 2020 - Wiley Online Library
Cloud computing is an Internet‐based computing where the information technology
resources are provided to end users following their request. With this technology, users and …

[HTML][HTML] A blockchain-empowered AAA scheme in the large-scale HetNet

N Shi, L Tan, W Li, X Qi, K Yu - Digital Communications and Networks, 2021 - Elsevier
Abstract A Large-Scale Heterogeneous Network (LS-HetNet) integrates different networks
into one uniform network system to provide seamless one-world network coverage. In LS …

Privacy protection and data security in cloud computing: a survey, challenges, and solutions

PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …

A survey of task allocation and load balancing in distributed systems

Y Jiang - IEEE Transactions on Parallel and Distributed …, 2015 - ieeexplore.ieee.org
In past decades, significant attention has been devoted to the task allocation and load
balancing in distributed systems. Although there have been some related surveys about this …

[PDF][PDF] 边缘计算数据安全与隐私保护研究综述

张佳乐, 赵彦超, 陈兵, 胡峰… - Journal on …, 2018 - infocomm-journal.com
随着物联网, 大数据和5G 网络的快速发展和广泛应用, 传统的云计算无法处理网络边缘设备所
产生的海量数据, 因此, 边缘计算应运而生. 然而, 由于边缘计算的内容感知, 实时计算 …

An access control model for cloud computing

YA Younis, K Kifayat, M Merabti - Journal of Information Security and …, 2014 - Elsevier
Cloud computing is considered one of the most dominant paradigms in the Information
Technology (IT) industry these days. It offers new cost effective services on-demand such as …

A survey of security and privacy challenges in cloud computing: solutions and future directions

Y Liu, YL Sun, J Ryoo, AV Vasilakos - 2015 - scholarcommons.scu.edu
While cloud computing is gaining popularity, diverse security and privacy issues are
emerging that hinder the rapid adoption of this new computing paradigm. And the …

[PDF][PDF] Job scheduling model for cloud computing based on multi-objective genetic algorithm

J Liu, XG Luo, XM Zhang, F Zhang, BN Li - International Journal of …, 2013 - Citeseer
Cloud computing is an emerging high performance computing environment with a large
scale, heterogeneous collection of autonomous systems and flexible computational …