Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
Comprehensive review: Privacy protection of user in location-aware services of mobile cloud computing
Z A. Almusaylim, NZ Jhanjhi - Wireless Personal Communications, 2020 - Springer
One of the recent trends of networking and mobile technology is mobile cloud computing
(MCC) that provides rich computational, storage resources and services in clouds to mobile …
(MCC) that provides rich computational, storage resources and services in clouds to mobile …
A survey on IoT security: application areas, security threats, and solution architectures
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects
can be empowered to create, receive, and exchange data in a seamless manner. Various …
can be empowered to create, receive, and exchange data in a seamless manner. Various …
Security and privacy in fog computing: Challenges
Fog computing paradigm extends the storage, networking, and computing facilities of the
cloud computing toward the edge of the networks while offloading the cloud data centers …
cloud computing toward the edge of the networks while offloading the cloud data centers …
Security and trust issues in fog computing: A survey
Fog computing uses one or more collaborative end users or near-user edge devices to
perform storage, communication, control, configuration, measurement and management …
perform storage, communication, control, configuration, measurement and management …
Fog computing: a comprehensive architectural survey
Fog computing is an emerging technology to address computing and networking bottlenecks
in large scale deployment of IoT applications. It is a promising complementary computing …
in large scale deployment of IoT applications. It is a promising complementary computing …
Lightweight cryptographic protocols for IoT-constrained devices: A survey
Internet of Things (IoT) is an emergent and evolving technology, interconnecting the cyber
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …
EFFECT: An efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid
Smart grid is considered as a promising approach to solve the problems of carbon emission
and energy crisis. In smart grid, the power consumption data are collected to optimize the …
and energy crisis. In smart grid, the power consumption data are collected to optimize the …
A dual privacy preserving scheme in continuous location-based services
With the development of wireless communication and positioning technology, location-
based services (LBSs) have been gaining tremendous popularity, due to its ability to greatly …
based services (LBSs) have been gaining tremendous popularity, due to its ability to greatly …
A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions
The Internet of Things (IoT) can enable seamless communication between millions of
billions of objects. As IoT applications continue to grow, they face several challenges …
billions of objects. As IoT applications continue to grow, they face several challenges …