A survey of security in cloud, edge, and fog computing

A Ometov, OL Molua, M Komarov, J Nurmi - Sensors, 2022 - mdpi.com
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …

Blockchain meets cloud computing: A survey

K Gai, J Guo, L Zhu, S Yu - IEEE Communications Surveys & …, 2020 - ieeexplore.ieee.org
Blockchain technology has been deemed to be an ideal choice for strengthening existing
computing systems in varied manners. As one of the network-enabled technologies, cloud …

Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model

GN Nguyen, NH Le Viet, M Elhoseny, K Shankar… - Journal of parallel and …, 2021 - Elsevier
Cyber–physical system (CPS) is the incorporation of physical processes with processing
and data transmission. Cybersecurity is a primary and challenging issue in healthcare due …

Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions

A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …

Computation offloading toward edge computing

L Lin, X Liao, H Jin, P Li - Proceedings of the IEEE, 2019 - ieeexplore.ieee.org
We are living in a world where massive end devices perform computing everywhere and
everyday. However, these devices are constrained by the battery and computational …

[HTML][HTML] Open RAN security: Challenges and opportunities

M Liyanage, A Braeken, S Shahabuddin… - Journal of Network and …, 2023 - Elsevier
Abstract Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RAN
(Radio Access Network), which defines interfaces that support inter-operation between …

Differential privacy techniques for cyber physical systems: A survey

MU Hassan, MH Rehmani… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …

Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions

S Ahmad, I Shakeel, S Mehfuz, J Ahmad - Computer Science Review, 2023 - Elsevier
In recent times, the machine learning (ML) community has recognized the deep learning
(DL) computing model as the Gold Standard. DL has gradually become the most widely …

Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …