An overview of Fog computing and its security issues
Tóm tắt
Từ khóa
Tài liệu tham khảo
BonomiF.Connected vehicles the internet of things and Fog computing. The Eighth ACM International Workshop on Vehicular Inter‐Networking (VANET) Las Vegas USA 2011;13–15.
BonomiF MilitoR ZhuJ AddepalliS.Fog computing and its role in the internet of things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing MCC'12 ACM Ambleside Unite Kingdom 2012;13–16.
Manreet K, 2014, Fog computing providing data security: a review, International Journal of Advanced Research in Computer Science and Software Engineering, 4, 832
ZhangL JiaW WenS YaoD.A man‐in‐the‐middle attack on 3G‐WLAN interworking.International Conference on Communications and Mobile Computing (CMC) Vol.1 Zhangjiajie China April 2010;121–125.
StojmenovicI WenS.The Fog computing paradigm: scenarios and security issues.2014 Federated Conference on Computer Science and Information Systems (FeDCSIS): IEEE Warsaw Poland 2014;1–8.
LiuK NgJ LeeV SonS StojmenovicI.Cooperative data dissemination in hybrid vehicular networks: Vanet as a software defined network 2014.Submitted for publication.
Cisco.Cisco delivers vision of fog computing to accelerate value from billions of connected devices Cisco January 2014.
HongK LillethunD RamachandranU OttenwälderB KoldehofeB.Opportunistic spatio‐temporal event processing for mobile situation awareness.Proceedings of the 7th ACM International Conference on Distributed Event‐Based Systems DEBS'13 ACM Arlington TX USA 2013;195–206.
MadsenH AlbeanuG BurtschyB Popentiu‐VladicescuFL.Reliability in the utility computing era: towards reliable fog computing.2013 20th International Conference on Systems Signals and Image Processing (IWSSIP) Bucharest Romania July 2013;43–46.
HongK LillethunD RamachandranU OttenwälderB KoldehofeB.Mobile fog: a programming model for large‐scale applications on the internet of things.Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing MCC'13 ACM Hongkong 2013;15–20.
NishioT ShinkumaR TakahashiT MandayamNB.Service‐oriented heterogeneous resource sharing for optimizing service latency in mobile cloud.Proceedings of the First International Workshop on Mobile Cloud Computing and Networking MobileCloud'13 ACM Bangalore India 2013;19–26.
OttenwalderB KoldehofeB RothermelK RamachandranU.MigCEP: operator migration for mobility driven distributed complex event processing.Proceedings of the 7th ACM International Conference on Distributed Event‐Based Systems DEBS'13 ACM Arlington TX USA 2013;183–194.
ZhuJ ChanD PrabhuM NatarajanP HuH BonomiF.Improving web sites performance using edge servers in fog computing architecture.2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE) Wailea‐makena HI USA March 2013;320–323.
BETaaS.Building the environment for the things as a service BETaaS Nov. 2012.
KorzhykD ConitzerV ParrR.Solving Stackelberg games with uncertain observability.The 10th International Conference on Autonomous Agents and Multiagent Systems ‐ volume 3 AAMAS '11 Taipei Taiwan 2011;1013–1020.
ZhouB CaoJ ZengX WuH.Adaptive traffic light control in wireless sensor network‐based intelligent transportation system.2010 IEEE 72nd Vehicular Technology Conference Fall (VTC 2010‐Fall) Ottawa Canada September 2010;1–5.
ZhouB CaoJ WuH.Adaptive traffic light control of multiple intersections in wsn‐based its.2011 IEEE 73rd Vehicular Technology Conference (VTC Spring) Budapest Hungary May 2011;1–5.
Broadcom BCM 5354. (Available from:http://www.broadcom.com.) [Accessed on 2 April 2015].
Wikipedia.Hooking what is hooking?2014. (Available from:http://en.wikipedia.org/wiki/Hooking) [Accessed on 2 April 2015].
NIST.Guidelines for smart grid cyber security (NIST 7628) 2010. (Available from:Http://csrc.nist.gov/publications/ PubsNISTIRs.html) [Accessed on 2 April 2015].
LewkoAB OkamotoT SahaiA TakashimaK WatersB.Fully secure functional encryption: attribute‐based encryption and (hierarchical) inner product encryption.Eurocrypt Riviera French 2010;62–91.
LewkoAB WatersB.Unbounded HIBE and attribute‐based encryption.Eurocrypt Tallinn Estonia 2011;547–567.
WatersB.Ciphertext‐policy attribute‐based encryption: an expressive efficient and provably secure realization.Public Key Cryptography Taormina Italy 2011;53–70.