Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Comprehensive review: Privacy protection of user in location-aware services of mobile cloud computing

Z A. Almusaylim, NZ Jhanjhi - Wireless Personal Communications, 2020 - Springer
One of the recent trends of networking and mobile technology is mobile cloud computing
(MCC) that provides rich computational, storage resources and services in clouds to mobile …

A survey on IoT security: application areas, security threats, and solution architectures

V Hassija, V Chamola, V Saxena, D Jain, P Goyal… - IEEe …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects
can be empowered to create, receive, and exchange data in a seamless manner. Various …

Security and privacy in fog computing: Challenges

M Mukherjee, R Matam, L Shu, L Maglaras… - IEEE …, 2017 - ieeexplore.ieee.org
Fog computing paradigm extends the storage, networking, and computing facilities of the
cloud computing toward the edge of the networks while offloading the cloud data centers …

Security and trust issues in fog computing: A survey

PY Zhang, MC Zhou, G Fortino - Future Generation Computer Systems, 2018 - Elsevier
Fog computing uses one or more collaborative end users or near-user edge devices to
perform storage, communication, control, configuration, measurement and management …

Fog computing: a comprehensive architectural survey

P Habibi, M Farhoudi, S Kazemian, S Khorsandi… - IEEE …, 2020 - ieeexplore.ieee.org
Fog computing is an emerging technology to address computing and networking bottlenecks
in large scale deployment of IoT applications. It is a promising complementary computing …

Lightweight cryptographic protocols for IoT-constrained devices: A survey

MN Khan, A Rao, S Camtepe - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is an emergent and evolving technology, interconnecting the cyber
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …

EFFECT: An efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid

Z Guan, Y Zhang, L Zhu, L Wu, S Yu - Science China Information Sciences, 2019 - Springer
Smart grid is considered as a promising approach to solve the problems of carbon emission
and energy crisis. In smart grid, the power consumption data are collected to optimize the …

A dual privacy preserving scheme in continuous location-based services

S Zhang, G Wang, MZA Bhuiyan… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
With the development of wireless communication and positioning technology, location-
based services (LBSs) have been gaining tremendous popularity, due to its ability to greatly …

A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions

M Burhan, H Alam, A Arsalan, RA Rehman… - IEEE …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) can enable seamless communication between millions of
billions of objects. As IoT applications continue to grow, they face several challenges …