메뉴 건너뛰기




Volumn 78, Issue , 2018, Pages 680-698

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges

Author keywords

Cloud computing; Fog computing; Mobile cloud computing; Mobile edge computing; Privacy; Security

Indexed keywords

AUGMENTED REALITY; CLOUD COMPUTING; DATA PRIVACY; EDGE COMPUTING; FOG; FOG COMPUTING; SECURITY SYSTEMS;

EID: 85008245198     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2016.11.009     Document Type: Article
Times cited : (1042)

References (132)
  • 1
    • 85029662988 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, The NIST Definition of Cloud Computing, SP 800-145,, [Online; accessed 15.09.16].
    • National Institute of Standards and Technology, The NIST Definition of Cloud Computing, SP 800-145, 2011. http://csrc.nist.gov/publications/PubsSPs.html#800-145  [Online; accessed 15.09.16].
    • (2011)
  • 2
    • 85029644731 scopus 로고    scopus 로고
    • International Data Corporation, IDC, Worldwide Public Cloud Services Spending Forecast to Double by 2019, According to IDC,, [Online; accessed 15.09.16].
    • International Data Corporation, IDC, Worldwide Public Cloud Services Spending Forecast to Double by 2019, According to IDC, 2016. https://www.idc.com/getdoc.jsp?containerId=prUS40960516  [Online; accessed 15.09.16].
    • (2016)
  • 3
    • 84960116587 scopus 로고    scopus 로고
    • A brief history of cloud offload: A personal journey from Odyssey through cyber foraging to cloudlets
    • Satyanarayanan, M., A brief history of cloud offload: A personal journey from Odyssey through cyber foraging to cloudlets. Mob. Comput. Commun. 18:4 (2015), 19–23, 10.1145/2721914.2721921.
    • (2015) Mob. Comput. Commun. , vol.18 , Issue.4 , pp. 19-23
    • Satyanarayanan, M.1
  • 4
    • 84996757871 scopus 로고    scopus 로고
    • Finding your way in the fog: Towards a comprehensive definition of fog computing
    • Vaquero, L.M., Rodero-Merino, L., Finding your way in the fog: Towards a comprehensive definition of fog computing. SIGCOMM Comput. Commun. Rev. 44:5 (2014), 27–32, 10.1145/2677046.2677052.
    • (2014) SIGCOMM Comput. Commun. Rev. , vol.44 , Issue.5 , pp. 27-32
    • Vaquero, L.M.1    Rodero-Merino, L.2
  • 6
    • 84925494226 scopus 로고    scopus 로고
    • A survey of mobile cloud computing applications: Perspectives and challenges
    • Wang, Y., Chen, I.-R., Wang, D.-C., A survey of mobile cloud computing applications: Perspectives and challenges. Wirel. Pers. Commun. 80:4 (2015), 1607–1623, 10.1007/s11277-014-2102-7.
    • (2015) Wirel. Pers. Commun. , vol.80 , Issue.4 , pp. 1607-1623
    • Wang, Y.1    Chen, I.-R.2    Wang, D.-C.3
  • 7
    • 85084160694 scopus 로고    scopus 로고
    • The case for the superfluid cloud
    • Proceedings of the 7th USENIX Conference on Hot Topics in Cloud Computing, HotCloud, 2015, pp. 1–6. URL
    • F. Manco, J. Martins, K. Yasukata, J. Mendes, S. Kuenzer, F. Huici, The case for the superfluid cloud, in: Proceedings of the 7th USENIX Conference on Hot Topics in Cloud Computing, HotCloud, 2015, pp. 1–6. URL http://dl.acm.org/citation.cfm?id=2827719.2827726.
    • Manco, F.1    Martins, J.2    Yasukata, K.3    Mendes, J.4    Kuenzer, S.5    Huici, F.6
  • 9
    • 85029615822 scopus 로고    scopus 로고
    • OPENi Consortium, Deliverable 2.3 - Security and Privacy Considerations for Cloud-based Services and Cloudlets,, [Online; accessed 15.09.16].
    • OPENi Consortium, Deliverable 2.3 - Security and Privacy Considerations for Cloud-based Services and Cloudlets, 2013. http://www.openi-ict.eu/deliverables/  [Online; accessed 15.09.16].
    • (2013)
  • 10
    • 84883726912 scopus 로고    scopus 로고
    • Security and privacy in mobile cloud computing
    • Proceedings of the 9th International Wireless Communications and Mobile Computing Conference, IWCMC, 2013, pp. 655–659.
    • H. Suo, Z. Liu, J. Wan, K. Zhou, Security and privacy in mobile cloud computing, in: Proceedings of the 9th International Wireless Communications and Mobile Computing Conference, IWCMC, 2013, pp. 655–659. http://dx.doi.org/10.1109/IWCMC.2013.6583635.
    • Suo, H.1    Liu, Z.2    Wan, J.3    Zhou, K.4
  • 13
    • 84961877275 scopus 로고    scopus 로고
    • On security and privacy issues of fog computing supported Internet of things environment
    • Proceedings of the 6th International Conference on the Network of the Future, NOF, 2015, pp. 1–3.
    • K. Lee, D. Kim, D. Ha, U. Rajput, H. Oh, On security and privacy issues of fog computing supported Internet of things environment, in: Proceedings of the 6th International Conference on the Network of the Future, NOF, 2015, pp. 1–3. http://dx.doi.org/10.1109/NOF.2015.7333287.
    • Lee, K.1    Kim, D.2    Ha, D.3    Rajput, U.4    Oh, H.5
  • 14
    • 84943612463 scopus 로고    scopus 로고
    • Security and privacy issues of fog computing: A survey
    • K. Xu H. Zhu Springer International Publishing
    • Yi, S., Qin, Z., Li, Q., Security and privacy issues of fog computing: A survey. Xu, K., Zhu, H., (eds.) Wireless Algorithms, Systems, and Applications Lecture Notes in Computer Science, vol. 9204, 2015, Springer International Publishing, 685–695, 10.1007/978-3-319-21837-3_67.
    • (2015) Wireless Algorithms, Systems, and Applications, Lecture Notes in Computer Science , vol.9204 , pp. 685-695
    • Yi, S.1    Qin, Z.2    Li, Q.3
  • 15
    • 85029667190 scopus 로고    scopus 로고
    • Yucianga Ltd, Open Fog Computing and Mobile Edge Cloud Gain Momentum,, [Online; accessed 15.09.16].
    • Yucianga Ltd, Open Fog Computing and Mobile Edge Cloud Gain Momentum, 2015. http://yucianga.info/?p=938  [Online; accessed 15.09.16].
    • (2015)
  • 16
    • 84912130127 scopus 로고    scopus 로고
    • The fog computing paradigm: Scenarios and security issues
    • Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, FedCSIS, 2014, pp. 1–8.
    • I. Stojmenovic, S. Wen, The fog computing paradigm: Scenarios and security issues, in: Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, FedCSIS, 2014, pp. 1–8. http://dx.doi.org/10.15439/2014F503.
    • Stojmenovic, I.1    Wen, S.2
  • 17
    • 84962076525 scopus 로고    scopus 로고
    • Fog computing: Issues and challenges in security and forensics
    • Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, COMPSAC, Vol. 3, 2015, pp. 53–59.
    • Y. Wang, T. Uehara, R. Sasaki, Fog computing: Issues and challenges in security and forensics, in: Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, COMPSAC, Vol. 3, 2015, pp. 53–59. http://dx.doi.org/10.1109/COMPSAC.2015.173.
    • Wang, Y.1    Uehara, T.2    Sasaki, R.3
  • 18
    • 84866627419 scopus 로고    scopus 로고
    • Fog computing and its role in the Internet of things
    • Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing, 2012, pp. 13–16.
    • F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the Internet of things, in: Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing, 2012, pp. 13–16. http://dx.doi.org/10.1145/2342509.2342513.
    • Bonomi, F.1    Milito, R.2    Zhu, J.3    Addepalli, S.4
  • 20
    • 84951050684 scopus 로고    scopus 로고
    • A survey of fog computing: Concepts, applications and issues
    • Proceedings of the 2015 Workshop on Mobile Big Data, Mobidata, 2015, pp. 37–42.
    • S. Yi, C. Li, Q. Li, A survey of fog computing: Concepts, applications and issues, in: Proceedings of the 2015 Workshop on Mobile Big Data, Mobidata, 2015, pp. 37–42. http://dx.doi.org/10.1145/2757384.2757397.
    • Yi, S.1    Li, C.2    Li, Q.3
  • 21
    • 85029619858 scopus 로고    scopus 로고
    • arXiv:1502.01815, Fog computing: Focusing on mobile users at the edge. Preprint, available online.
    • T.H. Luan, L. Gao, Z. Li, Y. Xiang, L. Sun, Fog computing: Focusing on mobile users at the edge. Preprint, available online arXiv:1502.01815.
    • Luan, T.H.1    Gao, L.2    Li, Z.3    Xiang, Y.4    Sun, L.5
  • 22
    • 84908631947 scopus 로고    scopus 로고
    • S. Rodriguez Mendez, C.E. Chung, Y.T. Wang, T. Mullen, T.P. Jung, Augmented brain computer interaction based on fog computing and linked data, in: Proceedings of the International Conference on Intelligent Environments, IE, 2014, pp. 374–377.
    • J. Zao, T.T. Gan, C.K. You, S. Rodriguez Mendez, C.E. Chung, Y.T. Wang, T. Mullen, T.P. Jung, Augmented brain computer interaction based on fog computing and linked data, in: Proceedings of the International Conference on Intelligent Environments, IE, 2014, pp. 374–377. http://dx.doi.org/10.1109/IE.2014.54.
    • Zao, J.1    Gan, T.T.2    You, C.K.3
  • 23
    • 84903125253 scopus 로고    scopus 로고
    • Towards wearable cognitive assistance
    • Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys, 2014, pp. 68–81.
    • K. Ha, Z. Chen, W. Hu, W. Richter, P. Pillai, M. Satyanarayanan, Towards wearable cognitive assistance, in: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys, 2014, pp. 68–81. http://dx.doi.org/10.1145/2594368.2594383.
    • Ha, K.1    Chen, Z.2    Hu, W.3    Richter, W.4    Pillai, P.5    Satyanarayanan, M.6
  • 24
    • 84923117513 scopus 로고    scopus 로고
    • Fog computing: A cloud to the ground support for smart things and machine-to-machine networks
    • Proceedings of the 2014 Australasian Telecommunication Networks and Applications Conference, ATNAC, 2014, pp. 117–122.
    • I. Stojmenovic, Fog computing: A cloud to the ground support for smart things and machine-to-machine networks, in: Proceedings of the 2014 Australasian Telecommunication Networks and Applications Conference, ATNAC, 2014, pp. 117–122. http://dx.doi.org/10.1109/ATNAC.2014.7020884.
    • Stojmenovic, I.1
  • 25
    • 84940980355 scopus 로고    scopus 로고
    • Steiner tree based optimal resource caching scheme in fog computing
    • Jingtao, S., Fuhong, L., Xianwei, Z., Xing, L., Steiner tree based optimal resource caching scheme in fog computing. China Commun. 12:8 (2015), 161–168, 10.1109/CC.2015.7224698.
    • (2015) China Commun. , vol.12 , Issue.8 , pp. 161-168
    • Jingtao, S.1    Fuhong, L.2    Xianwei, Z.3    Xing, L.4
  • 26
    • 84957600748 scopus 로고    scopus 로고
    • A shared parking model in vehicular network using fog and cloud environment
    • Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, APNOMS, 2015, pp. 321–326.
    • O.T.T. Kim, N.D. Tri, V.D. Nguyen, N. Tran, C.S. Hong, A shared parking model in vehicular network using fog and cloud environment, in: Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, APNOMS, 2015, pp. 321–326. http://dx.doi.org/10.1109/APNOMS.2015.7275447.
    • Kim, O.T.T.1    Tri, N.D.2    Nguyen, V.D.3    Tran, N.4    Hong, C.S.5
  • 27
    • 85029615364 scopus 로고    scopus 로고
    • Open Fog Consortium, [Online; accessed 15.09.16].
    • Open Fog Consortium, http://www.openfogconsortium.org/  [Online; accessed 15.09.16].
  • 28
    • 84939158550 scopus 로고    scopus 로고
    • A context-based future network infrastructure for IoT services
    • Chin, W.S., soo Kim, H., Heo, Y.J., Jang, J.W., A context-based future network infrastructure for IoT services. Procedia Comput. Sci. 56 (2015), 266–270, 10.1016/j.procs.2015.07.207.
    • (2015) Procedia Comput. Sci. , vol.56 , pp. 266-270
    • Chin, W.S.1    soo Kim, H.2    Heo, Y.J.3    Jang, J.W.4
  • 29
    • 84953311242 scopus 로고    scopus 로고
    • Fog computing architecture to enable consumer centric Internet of things services
    • Proceedings of the 2015 IEEE International Symposium on Consumer Electronics, ISCE, 2015, pp. 1–2.
    • S. Datta, C. Bonnet, J. Haerri, Fog computing architecture to enable consumer centric Internet of things services, in: Proceedings of the 2015 IEEE International Symposium on Consumer Electronics, ISCE, 2015, pp. 1–2. http://dx.doi.org/10.1109/ISCE.2015.7177778.
    • Datta, S.1    Bonnet, C.2    Haerri, J.3
  • 30
    • 84930672512 scopus 로고    scopus 로고
    • A cloud visitation platform to facilitate cloud federation and fog computing
    • Zhanikeev, M., A cloud visitation platform to facilitate cloud federation and fog computing. Computer 48:5 (2015), 80–83, 10.1109/MC.2015.122.
    • (2015) Computer , vol.48 , Issue.5 , pp. 80-83
    • Zhanikeev, M.1
  • 31
    • 85029665329 scopus 로고    scopus 로고
    • arXiv:1507.04492, The Internet of Flying-Things: Opportunities and Challenges with Airborne Fog Computing and Mobile Cloud in the Clouds. Preprint, available online. URL.
    • S.W. Loke, The Internet of Flying-Things: Opportunities and Challenges with Airborne Fog Computing and Mobile Cloud in the Clouds. Preprint, available online arXiv:1507.04492. URL http://arxiv.org/abs/1507.04492.
    • Loke, S.W.1
  • 32
    • 85029632538 scopus 로고    scopus 로고
    • IBM News Releases, IBM and Nokia Siemens Networks announce world first mobile edge computing platform,, [Online; accessed 15.09.16].
    • IBM News Releases, IBM and Nokia Siemens Networks announce world first mobile edge computing platform, 2013. http://www-03.ibm.com/press/us/en/pressrelease/40490.wss  [Online; accessed 15.09.16].
    • (2013)
  • 33
    • 85029663799 scopus 로고    scopus 로고
    • ETSI, Mobile-Edge Computing Introductory Technical White Paper,, [Online; accessed 15.09.16].
    • ETSI, Mobile-Edge Computing Introductory Technical White Paper, 2014. http://www.etsi.org/technologies-clusters/technologies/mobile-edge-computing  [Online; accessed 15.09.16].
    • (2014)
  • 35
    • 85029664006 scopus 로고    scopus 로고
    • Mobile Edge Computing: A key technology towards 5G, 2015. [Online; accessed 15.09.16].
    • Y.C. Hu, M. Patel, D. Sabella, N. Sprecher, V. Young, Mobile Edge Computing: A key technology towards 5G, 2015. http://www.etsi.org/technologies-clusters/technologies/mobile-edge-computing  [Online; accessed 15.09.16].
    • Hu, Y.C.1    Patel, M.2    Sabella, D.3    Sprecher, N.4    Young, V.5
  • 36
    • 84890885156 scopus 로고    scopus 로고
    • Cloud computing models and their application in LTE based cellular systems
    • Proceedings of the 2013 IEEE International Conference on Communications Workshops, ICC, 2013, pp. 750–755.
    • A.J. Staring, G. Karagiannis, Cloud computing models and their application in LTE based cellular systems, in: Proceedings of the 2013 IEEE International Conference on Communications Workshops, ICC, 2013, pp. 750–755. http://dx.doi.org/10.1109/ICCW.2013.6649333.
    • Staring, A.J.1    Karagiannis, G.2
  • 37
    • 84940434751 scopus 로고    scopus 로고
    • E. Calvanese Strinati, A seamless integration of computationally-enhanced base stations into mobile networks towards 5G, in: Proceedings of the IEEE 81st Vehicular Technology Conference, VTC Spring, 2015, pp. 1–5.
    • M.A. Puente, Z. Becvar, M. Rohlik, F. Lobillo, E. Calvanese Strinati, A seamless integration of computationally-enhanced base stations into mobile networks towards 5G, in: Proceedings of the IEEE 81st Vehicular Technology Conference, VTC Spring, 2015, pp. 1–5. http://dx.doi.org/10.1109/VTCSpring.2015.7145645.
    • Puente, M.A.1    Becvar, Z.2    Rohlik, M.3    Lobillo, F.4
  • 38
    • 84940971562 scopus 로고    scopus 로고
    • Invited paper: The audacity of fiber-wireless (FiWi) networks: Revisited for clouds and cloudlets
    • Maier, M., Rimal, B.P., Invited paper: The audacity of fiber-wireless (FiWi) networks: Revisited for clouds and cloudlets. China Commun. 12:8 (2015), 33–45, 10.1109/CC.2015.7224704.
    • (2015) China Commun. , vol.12 , Issue.8 , pp. 33-45
    • Maier, M.1    Rimal, B.P.2
  • 39
    • 71749119799 scopus 로고    scopus 로고
    • Green cloud on the horizon
    • M. Jaatun G. Zhao C. Rong Springer Berlin, Heidelberg
    • Ali, M., Green cloud on the horizon. Jaatun, M., Zhao, G., Rong, C., (eds.) Cloud Computing Lecture Notes in Computer Science, vol. 5931, 2009, Springer, Berlin, Heidelberg, 451–459, 10.1007/978-3-642-10665-1_41.
    • (2009) Cloud Computing, Lecture Notes in Computer Science , vol.5931 , pp. 451-459
    • Ali, M.1
  • 40
    • 84864309803 scopus 로고    scopus 로고
    • Advancing the state of mobile cloud computing
    • Proceedings of the 3rd ACM Workshop on Mobile Cloud Computing and Services, MCS, 2012, pp. 21–28.
    • P. Bahl, R.Y. Han, L.E. Li, M. Satyanarayanan, Advancing the state of mobile cloud computing, in: Proceedings of the 3rd ACM Workshop on Mobile Cloud Computing and Services, MCS, 2012, pp. 21–28. http://dx.doi.org/10.1145/2307849.2307856.
    • Bahl, P.1    Han, R.Y.2    Li, L.E.3    Satyanarayanan, M.4
  • 41
    • 84898825587 scopus 로고    scopus 로고
    • Mobile cloud computing: A survey, state of art and future directions
    • Rahimi, M.R., Ren, J., Liu, C.H., Vasilakos, A.V., Venkatasubramanian, N., Mobile cloud computing: A survey, state of art and future directions. Mob. Netw. Appl. 19:2 (2014), 133–143, 10.1007/s11036-013-0477-4.
    • (2014) Mob. Netw. Appl. , vol.19 , Issue.2 , pp. 133-143
    • Rahimi, M.R.1    Ren, J.2    Liu, C.H.3    Vasilakos, A.V.4    Venkatasubramanian, N.5
  • 42
    • 84888322916 scopus 로고    scopus 로고
    • A survey of mobile cloud computing: Architecture, applications, and approaches
    • Dinh, H.T., Lee, C., Niyato, D., Wang, P., A survey of mobile cloud computing: Architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13:18 (2013), 1587–1611, 10.1002/wcm.1203.
    • (2013) Wirel. Commun. Mob. Comput. , vol.13 , Issue.18 , pp. 1587-1611
    • Dinh, H.T.1    Lee, C.2    Niyato, D.3    Wang, P.4
  • 43
    • 85029662916 scopus 로고    scopus 로고
    • arXiv:1510.07250, Aqua Computing: Coupling Computing and Communications. Preprint, available online. URL.
    • C.S. Magurawalage, K. Yang, K. Wang, Aqua Computing: Coupling Computing and Communications. Preprint, available online arXiv:1510.07250. URL http://arxiv.org/abs/1510.07250.
    • Magurawalage, C.S.1    Yang, K.2    Wang, K.3
  • 44
    • 84894646273 scopus 로고    scopus 로고
    • Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges
    • Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., Buyya, R., Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Commun. Surv. Tutor. 16:1 (2014), 337–368, 10.1109/SURV.2013.070813.00285.
    • (2014) IEEE Commun. Surv. Tutor. , vol.16 , Issue.1 , pp. 337-368
    • Abolfazli, S.1    Sanaei, Z.2    Ahmed, E.3    Gani, A.4    Buyya, R.5
  • 45
    • 70350136710 scopus 로고    scopus 로고
    • The case for VM-based cloudlets in mobile computing
    • Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N., The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput. 8:4 (2009), 14–23, 10.1109/MPRV.2009.82.
    • (2009) IEEE Pervasive Comput. , vol.8 , Issue.4 , pp. 14-23
    • Satyanarayanan, M.1    Bahl, P.2    Caceres, R.3    Davies, N.4
  • 46
    • 85029657057 scopus 로고    scopus 로고
    • Elijah: Cloudlet-based Mobile Computing, 2015. [Online; accessed 15.09.16].
    • M. Satyanarayanan, et al. Elijah: Cloudlet-based Mobile Computing, 2015. http://elijah.cs.cmu.edu/  [Online; accessed 15.09.16].
    • Satyanarayanan, M.1
  • 47
    • 85007015710 scopus 로고    scopus 로고
    • Are Cloudlets Necessary?, Technical Report CMU–CS–15–139
    • School of Computer Science, Carnegie Mellon University Pittsburgh, PA October
    • Gao, Y., Hu, W., Ha, K., Amos, B., Pillai, P., Satyanarayanan, M., Are Cloudlets Necessary?, Technical Report CMU–CS–15–139., 2015, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA October.
    • (2015)
    • Gao, Y.1    Hu, W.2    Ha, K.3    Amos, B.4    Pillai, P.5    Satyanarayanan, M.6
  • 48
    • 77954990097 scopus 로고    scopus 로고
    • Hyrax: Cloud computing on mobile devices using mapreduce
    • (Master Thesis CMU–CS–09–164) School of Computer Science, Carnegie Mellon University Pittsburgh, PA September
    • Marinelli, E.E., Hyrax: Cloud computing on mobile devices using mapreduce. (Master Thesis CMU–CS–09–164), 2009, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA September.
    • (2009)
    • Marinelli, E.E.1
  • 49
    • 84960153004 scopus 로고    scopus 로고
    • Femto clouds: Leveraging mobile devices to provide cloud service at the edge
    • Proceedings of the IEEE 8th International Conference on Cloud Computing, CLOUD, 2015, pp. 9–16.
    • K. Habak, M. Ammar, K. Harras, E. Zegura, Femto clouds: Leveraging mobile devices to provide cloud service at the edge, in: Proceedings of the IEEE 8th International Conference on Cloud Computing, CLOUD, 2015, pp. 9–16. http://dx.doi.org/10.1109/CLOUD.2015.12.
    • Habak, K.1    Ammar, M.2    Harras, K.3    Zegura, E.4
  • 50
    • 84939537469 scopus 로고    scopus 로고
    • Aura: An IoT based cloud infrastructure for localized mobile computation outsourcing
    • Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud, 2015, pp. 183–188.
    • R. Hasan, M. Hossain, R. Khan, Aura: An IoT based cloud infrastructure for localized mobile computation outsourcing, in: Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud, 2015, pp. 183–188. http://dx.doi.org/10.1109/MobileCloud.2015.37.
    • Hasan, R.1    Hossain, M.2    Khan, R.3
  • 51
    • 84977977898 scopus 로고    scopus 로고
    • Elastic virtual machine placement in cloud computing network environments
    • Kavvadia, E., Sagiadinos, S., Oikonomou, K., Tsioutsiouliklis, G., Assa, S., Elastic virtual machine placement in cloud computing network environments. Comput. Netw. 93:3 (2015), 435–447, 10.1016/j.comnet.2015.09.038.
    • (2015) Comput. Netw. , vol.93 , Issue.3 , pp. 435-447
    • Kavvadia, E.1    Sagiadinos, S.2    Oikonomou, K.3    Tsioutsiouliklis, G.4    Assa, S.5
  • 52
    • 84940416660 scopus 로고    scopus 로고
    • The fog balancing: Load distribution for small cell cloud computing
    • Proceedings of the IEEE 81st Vehicular Technology Conference, VTC Spring, 2015, pp. 1–6.
    • J. Oueis, E. Strinati, S. Barbarossa, The fog balancing: Load distribution for small cell cloud computing, in: Proceedings of the IEEE 81st Vehicular Technology Conference, VTC Spring, 2015, pp. 1–6. http://dx.doi.org/10.1109/VTCSpring.2015.7146129.
    • Oueis, J.1    Strinati, E.2    Barbarossa, S.3
  • 53
    • 84881119458 scopus 로고    scopus 로고
    • MigCEP: Operator migration for mobility driven distributed complex event processing
    • Proceedings of the 7th ACM International Conference on Distributed Event-based Systems, DEBS, 2013, pp. 183–194.
    • B. Ottenwälder, B. Koldehofe, K. Rothermel, U. Ramachandran, MigCEP: Operator migration for mobility driven distributed complex event processing, in: Proceedings of the 7th ACM International Conference on Distributed Event-based Systems, DEBS, 2013, pp. 183–194. http://dx.doi.org/10.1145/2488222.2488265.
    • Ottenwälder, B.1    Koldehofe, B.2    Rothermel, K.3    Ramachandran, U.4
  • 54
    • 84881122666 scopus 로고    scopus 로고
    • Opportunistic spatio-temporal event processing for mobile situation awareness
    • Proceedings of the 7th ACM International Conference on Distributed Event-based Systems, DEBS, 2013, pp. 195–206.
    • K. Hong, D. Lillethun, U. Ramachandran, B. Ottenwälder, B. Koldehofe, Opportunistic spatio-temporal event processing for mobile situation awareness, in: Proceedings of the 7th ACM International Conference on Distributed Event-based Systems, DEBS, 2013, pp. 195–206. http://dx.doi.org/10.1145/2488222.2488266.
    • Hong, K.1    Lillethun, D.2    Ramachandran, U.3    Ottenwälder, B.4    Koldehofe, B.5
  • 56
    • 84949484206 scopus 로고    scopus 로고
    • High performance computing and network function virtualization: A major challenge towards network programmability
    • Proceedings of the 2015 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom, 2015, pp. 137–141.
    • P. Paglierani, High performance computing and network function virtualization: A major challenge towards network programmability, in: Proceedings of the 2015 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom, 2015, pp. 137–141. http://dx.doi.org/10.1109/BlackSeaCom.2015.7185102.
    • Paglierani, P.1
  • 57
    • 77958150494 scopus 로고    scopus 로고
    • Real-time search for real-world entities: A survey
    • Romer, K., Ostermaier, B., Mattern, F., Fahrmair, M., Kellerer, W., Real-time search for real-world entities: A survey. Proc. IEEE 98:11 (2010), 1887–1902, 10.1109/JPROC.2010.2062470.
    • (2010) Proc. IEEE , vol.98 , Issue.11 , pp. 1887-1902
    • Romer, K.1    Ostermaier, B.2    Mattern, F.3    Fahrmair, M.4    Kellerer, W.5
  • 58
    • 84957592886 scopus 로고    scopus 로고
    • A fog based system model for cooperative IoT node pairing using matching theory
    • Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, APNOMS, 2015, pp. 309–314.
    • S. Abedin, M. Alam, N. Tran, C.S. Hong, A fog based system model for cooperative IoT node pairing using matching theory, in: Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, APNOMS, 2015, pp. 309–314. http://dx.doi.org/10.1109/APNOMS.2015.7275445.
    • Abedin, S.1    Alam, M.2    Tran, N.3    Hong, C.S.4
  • 59
    • 84921528293 scopus 로고    scopus 로고
    • CARDAP: A scalable energy-efficient context aware distributed mobile data analytics platform for the fog
    • Y. Manolopoulos G. Trajcevski M. Kon-Popovska Springer International Publishing
    • Jayaraman, P., Gomes, J., Nguyen, H., Abdallah, Z., Krishnaswamy, S., Zaslavsky, A., CARDAP: A scalable energy-efficient context aware distributed mobile data analytics platform for the fog. Manolopoulos, Y., Trajcevski, G., Kon-Popovska, M., (eds.) Advances in Databases and Information Systems Lecture Notes in Computer Science, vol. 8716, 2014, Springer International Publishing, 192–206, 10.1007/978-3-319-10933-6_15.
    • (2014) Advances in Databases and Information Systems, Lecture Notes in Computer Science , vol.8716 , pp. 192-206
    • Jayaraman, P.1    Gomes, J.2    Nguyen, H.3    Abdallah, Z.4    Krishnaswamy, S.5    Zaslavsky, A.6
  • 60
    • 84946029667 scopus 로고    scopus 로고
    • E-HAMC: Leveraging fog computing for emergency alert service
    • Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015, pp. 518–523.
    • M. Aazam, E.-N. Huh, E-HAMC: Leveraging fog computing for emergency alert service, in: Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015, pp. 518–523. http://dx.doi.org/10.1109/PERCOMW.2015.7134091.
    • Aazam, M.1    Huh, E.-N.2
  • 61
    • 84960145851 scopus 로고    scopus 로고
    • Network store: Exploring slicing in future 5G networks
    • Proceedings of the 10th International Workshop on Mobility in the Evolving Internet Architecture, MobiArch, 2015, pp. 8–13.
    • N. Nikaein, E. Schiller, R. Favraud, K. Katsalis, D. Stavropoulos, I. Alyafawi, Z. Zhao, T. Braun, T. Korakis, Network store: Exploring slicing in future 5G networks, in: Proceedings of the 10th International Workshop on Mobility in the Evolving Internet Architecture, MobiArch, 2015, pp. 8–13. http://dx.doi.org/10.1145/2795381.2795390.
    • Nikaein, N.1    Schiller, E.2    Favraud, R.3    Katsalis, K.4    Stavropoulos, D.5    Alyafawi, I.6    Zhao, Z.7    Braun, T.8    Korakis, T.9
  • 62
    • 84964445274 scopus 로고    scopus 로고
    • Securing the Internet of things: Mapping IoT attack surface areas with the OWASP IoT top 10 project
    • D. Miessler, Securing the Internet of things: Mapping IoT attack surface areas with the OWASP IoT top 10 project, in: Proceedings of the 2015 RSA Conference, 2015.
    • (2015) Proceedings of the 2015 RSA Conference
    • Miessler, D.1
  • 63
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed Internet of things
    • Roman, R., Zhou, J., Lopez, J., On the features and challenges of security and privacy in distributed Internet of things. Comput. Netw. 57:10 (2013), 2266–2279, 10.1016/j.comnet.2012.12.018.
    • (2013) Comput. Netw. , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 64
    • 84856897107 scopus 로고    scopus 로고
    • Cloud computing: Challenges and future directions
    • Choo, K.-K.R., Cloud computing: Challenges and future directions. Trends Issues Crime Criminal Justice 400 (2010), 1–6.
    • (2010) Trends Issues Crime Criminal Justice , vol.400 , pp. 1-6
    • Choo, K.-K.R.1
  • 65
    • 84896456624 scopus 로고    scopus 로고
    • Highlights from making sense of Snowden, Part II: What's significant in the NSA revelations
    • Landau, S., Highlights from making sense of Snowden, Part II: What's significant in the NSA revelations. IEEE Secur. Privacy 12:1 (2014), 62–64, 10.1109/MSP.2013.161.
    • (2014) IEEE Secur. Privacy , vol.12 , Issue.1 , pp. 62-64
    • Landau, S.1
  • 66
    • 84928750893 scopus 로고    scopus 로고
    • Cloud attack and risk assessment taxonomy
    • Juliadotter, N.V., Choo, K.-K.R., Cloud attack and risk assessment taxonomy. IEEE Cloud Comput. 2:1 (2015), 14–20, 10.1109/MCC.2015.2.
    • (2015) IEEE Cloud Comput. , vol.2 , Issue.1 , pp. 14-20
    • Juliadotter, N.V.1    Choo, K.-K.R.2
  • 67
    • 84919340836 scopus 로고    scopus 로고
    • Multi-tiered security architecture for ARM via the virtualization and security extensions
    • Proceedings of the 25th International Workshop on the Database and Expert Systems Applications DEXA, 2014, pp. 308–312.
    • T. Lengyel, T. Kittel, J. Pfoh, C. Eckert, Multi-tiered security architecture for ARM via the virtualization and security extensions, in: Proceedings of the 25th International Workshop on the Database and Expert Systems Applications DEXA, 2014, pp. 308–312. http://dx.doi.org/10.1109/DEXA.2014.68.
    • Lengyel, T.1    Kittel, T.2    Pfoh, J.3    Eckert, C.4
  • 68
    • 84880098818 scopus 로고    scopus 로고
    • A survey of security issues in hardware virtualization
    • Pék, G., Buttyán, L., Bencsáth, B., A survey of security issues in hardware virtualization. ACM Comput. Surv. 45:3 (2013), 40:1–40:34, 10.1145/2480741.2480757.
    • (2013) ACM Comput. Surv. , vol.45 , Issue.3 , pp. 401-40:34
    • Pék, G.1    Buttyán, L.2    Bencsáth, B.3
  • 70
    • 77149139158 scopus 로고    scopus 로고
    • Limits of predictability in human mobility
    • Song, C., Qu, Z., Blumm, N., Barabási, A.-L., Limits of predictability in human mobility. Science 327:5968 (2010), 1018–1021, 10.1126/science.1177170.
    • (2010) Science , vol.327 , Issue.5968 , pp. 1018-1021
    • Song, C.1    Qu, Z.2    Blumm, N.3    Barabási, A.-L.4
  • 71
    • 84942465510 scopus 로고    scopus 로고
    • A cloud-focused mobile forensics methodology
    • Do, Q., Martini, B., Choo, K.-K.R., A cloud-focused mobile forensics methodology. IEEE Cloud Comput. 2:4 (2015), 60–65, 10.1109/MCC.2015.71.
    • (2015) IEEE Cloud Comput. , vol.2 , Issue.4 , pp. 60-65
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3
  • 72
    • 85013744824 scopus 로고    scopus 로고
    • Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments
    • Elsevier
    • Barrett, D., Kipper, G., Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments. 2010, Elsevier.
    • (2010)
    • Barrett, D.1    Kipper, G.2
  • 73
    • 84971492452 scopus 로고    scopus 로고
    • Cloud incident handling and forensic-by-design: Cloud storage as a case study
    • in press
    • Ab Rahman, N.H., Cahyani, N.D.W., Choo, K.-K.R., Cloud incident handling and forensic-by-design: Cloud storage as a case study. Concurr. Comput. Pract. Exper., 2016, 10.1002/cpe.3868 in press.
    • (2016) Concurr. Comput. Pract. Exper.
    • Ab Rahman, N.H.1    Cahyani, N.D.W.2    Choo, K.-K.R.3
  • 74
    • 84939497302 scopus 로고    scopus 로고
    • Towards a systematic analysis of challenges and issues in secure mobile cloud forensics
    • Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015, pp. 237–238.
    • S. Zawoad, R. Hasan, Towards a systematic analysis of challenges and issues in secure mobile cloud forensics, in: Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015, pp. 237–238. http://dx.doi.org/10.1109/MobileCloud.2015.32.
    • Zawoad, S.1    Hasan, R.2
  • 75
    • 84905817532 scopus 로고    scopus 로고
    • Interconnected cloud computing environments: Challenges, taxonomy, and survey
    • Toosi, A.N., Calheiros, R.N., Buyya, R., Interconnected cloud computing environments: Challenges, taxonomy, and survey. ACM Comput. Surv. 47:1 (2014), 7:1–7:47, 10.1145/2593512.
    • (2014) ACM Comput. Surv. , vol.47 , Issue.1 , pp. 71-7:47
    • Toosi, A.N.1    Calheiros, R.N.2    Buyya, R.3
  • 76
    • 84937622256 scopus 로고    scopus 로고
    • Attribute-based authorization for structured Peer-to-Peer (P2P) networks
    • Touceda, D.S., Cmara, J.M.S., Zeadally, S., Soriano, M., Attribute-based authorization for structured Peer-to-Peer (P2P) networks. Comput. Stand. Interfaces 42 (2015), 71–83, 10.1016/j.csi.2015.04.007.
    • (2015) Comput. Stand. Interfaces , vol.42 , pp. 71-83
    • Touceda, D.S.1    Cmara, J.M.S.2    Zeadally, S.3    Soriano, M.4
  • 77
    • 84953776557 scopus 로고    scopus 로고
    • A secure authentication scheme for mobicloud
    • International Conference on Computer Communication and Informatics, ICCCI, 2015, pp. 1–6.
    • A. Donald, L. Arockiam, A secure authentication scheme for mobicloud, in: International Conference on Computer Communication and Informatics, ICCCI, 2015, pp. 1–6. http://dx.doi.org/10.1109/ICCCI.2015.7218101.
    • Donald, A.1    Arockiam, L.2
  • 78
    • 84991768903 scopus 로고    scopus 로고
    • Octopus: An edge-fog mutual authentication scheme
    • Ibrahim, M.H., Octopus: An edge-fog mutual authentication scheme. Int. J. Netw. Secur. 18:6 (2016), 1089–1101.
    • (2016) Int. J. Netw. Secur. , vol.18 , Issue.6 , pp. 1089-1101
    • Ibrahim, M.H.1
  • 79
    • 85027942960 scopus 로고    scopus 로고
    • A privacy-aware authentication scheme for distributed mobile cloud computing services
    • Tsai, J.-L., Lo, N.-W., A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 9:3 (2015), 805–815, 10.1109/JSYST.2014.2322973.
    • (2015) IEEE Syst. J. , vol.9 , Issue.3 , pp. 805-815
    • Tsai, J.-L.1    Lo, N.-W.2
  • 80
    • 85029650583 scopus 로고    scopus 로고
    • Security architecture for federated mobile cloud computing
    • Springer (in press)
    • Xu, S., Ratazzi, E.P., Du, W., Security architecture for federated mobile cloud computing. Mobile Cloud Security, 2016, Springer (in press).
    • (2016) Mobile Cloud Security
    • Xu, S.1    Ratazzi, E.P.2    Du, W.3
  • 81
    • 84903835491 scopus 로고    scopus 로고
    • A. Benkara Mostefa, F. Houacine, H. Cagnon, Cloudlets authentication in nfc-based mobile computing, in: Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2014, pp. 267–272.
    • S. Bouzefrane, A. Benkara Mostefa, F. Houacine, H. Cagnon, Cloudlets authentication in nfc-based mobile computing, in: Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2014, pp. 267–272. http://dx.doi.org/10.1109/MobileCloud.2014.46.
    • Bouzefrane, S.1
  • 82
    • 84886728890 scopus 로고    scopus 로고
    • Secure localization and location verification in wireless sensor networks: A survey
    • Zeng, Y., Cao, J., Hong, J., Zhang, S., Xie, L., Secure localization and location verification in wireless sensor networks: A survey. J. Supercomput. 64:3 (2010), 685–701, 10.1007/s11227-010-0501-4.
    • (2010) J. Supercomput. , vol.64 , Issue.3 , pp. 685-701
    • Zeng, Y.1    Cao, J.2    Hong, J.3    Zhang, S.4    Xie, L.5
  • 84
    • 84953271237 scopus 로고    scopus 로고
    • Efficient handover authentication with user anonymity and untraceability for mobile cloud computing
    • URL
    • Yang, X., Huang, X., Liu, J.K., Efficient handover authentication with user anonymity and untraceability for mobile cloud computing. Future Gener. Comput. Syst., 2015, 10.1016/j.future.2015.09.028 URL http://www.sciencedirect.com/science/article/pii/S0167739X15003088.
    • (2015) Future Gener. Comput. Syst.
    • Yang, X.1    Huang, X.2    Liu, J.K.3
  • 85
    • 84959555644 scopus 로고    scopus 로고
    • Personal cloudlets: Implementing a user-centric datastore with privacy aware access control for cloud-based data platforms
    • Proceedings of the IEEE/ACM 1st International Workshop on Technical and Legal aspects of data privacy and Security, TELERISE, 2015, pp. 38–43.
    • D. McCarthy, P. Malone, J. Hange, K. Doyle, E. Robson, D. Conway, S. Ivanov, L. Radziwonowicz, R. Kleinfeld, T. Michalareas, T. Kastrinogiannis, N. Stasinos, F. Lampathaki, Personal cloudlets: Implementing a user-centric datastore with privacy aware access control for cloud-based data platforms, in: Proceedings of the IEEE/ACM 1st International Workshop on Technical and Legal aspects of data privacy and Security, TELERISE, 2015, pp. 38–43. http://dx.doi.org/10.1109/TELERISE.2015.15.
    • McCarthy, D.1    Malone, P.2    Hange, J.3    Doyle, K.4    Robson, E.5    Conway, D.6    Ivanov, S.7    Radziwonowicz, L.8    Kleinfeld, R.9    Michalareas, T.10    Kastrinogiannis, T.11    Stasinos, N.12    Lampathaki, F.13
  • 86
    • 84910634929 scopus 로고    scopus 로고
    • Robust multi-factor authentication for fragile communications
    • Huang, X., Xiang, Y., Bertino, E., Zhou, J., Xu, L., Robust multi-factor authentication for fragile communications. IEEE Trans. Dependable Secure Comput. 11:6 (2014), 568–581, 10.1109/TDSC.2013.2297110.
    • (2014) IEEE Trans. Dependable Secure Comput. , vol.11 , Issue.6 , pp. 568-581
    • Huang, X.1    Xiang, Y.2    Bertino, E.3    Zhou, J.4    Xu, L.5
  • 88
    • 84941286216 scopus 로고    scopus 로고
    • Policy-driven security management for fog computing: Preliminary framework and a case study
    • Proceedings of the IEEE 15th International Conference on Information Reuse and Integration, IRI, 2014, pp. 16–23.
    • C. Dsouza, G.-J. Ahn, M. Taguinod, Policy-driven security management for fog computing: Preliminary framework and a case study, in: Proceedings of the IEEE 15th International Conference on Information Reuse and Integration, IRI, 2014, pp. 16–23. http://dx.doi.org/10.1109/IRI.2014.7051866.
    • Dsouza, C.1    Ahn, G.-J.2    Taguinod, M.3
  • 89
    • 84959084095 scopus 로고    scopus 로고
    • A Survey of extended role-based access control in cloud computing
    • W. E. Wong (Ed.), Proceedings of the 4th International Conference on Computer Engineering and Networks, 2015, pp. 821–831.
    • H. Li, S. Wang, X. Tian, W. Wei, C. Sun, A Survey of extended role-based access control in cloud computing, in: W. E. Wong (Ed.), Proceedings of the 4th International Conference on Computer Engineering and Networks, 2015, pp. 821–831. http://dx.doi.org/10.1007/978-3-319-11104-9_95.
    • Li, H.1    Wang, S.2    Tian, X.3    Wei, W.4    Sun, C.5
  • 91
    • 84857523561 scopus 로고    scopus 로고
    • A distributed access control architecture for cloud computing
    • Almutairi, A.A., Sarfraz, M.I., Basalamah, S., Aref, W.G., Ghafoor, A., A distributed access control architecture for cloud computing. IEEE Softw. 29:2 (2012), 36–44, 10.1109/MS.2011.153.
    • (2012) IEEE Softw. , vol.29 , Issue.2 , pp. 36-44
    • Almutairi, A.A.1    Sarfraz, M.I.2    Basalamah, S.3    Aref, W.G.4    Ghafoor, A.5
  • 92
    • 84944539539 scopus 로고    scopus 로고
    • DAA-A: Direct anonymous attestation with attributes
    • M. Conti M. Schunter I. Askoxylakis Springer International Publishing
    • Chen, L., Urian, R., DAA-A: Direct anonymous attestation with attributes. Conti, M., Schunter, M., Askoxylakis, I., (eds.) Trust and Trustworthy Computing Lecture Notes in Computer Science, vol. 9229, 2015, Springer International Publishing, 228–245, 10.1007/978-3-319-22846-4_14.
    • (2015) Trust and Trustworthy Computing, Lecture Notes in Computer Science , vol.9229 , pp. 228-245
    • Chen, L.1    Urian, R.2
  • 94
    • 84941878757 scopus 로고    scopus 로고
    • OCP: A protocol for secure communication in federated content networks
    • security and Privacy in Unified Communications: Challenges and Solutions
    • Pimentel, H.M., Kopp, S., ~, M.A.S. Jr., Silveira, R.M., Bressan, G., OCP: A protocol for secure communication in federated content networks. Comput. Commun. 68 (2015), 47–60, 10.1016/j.comcom.2015.07.026 security and Privacy in Unified Communications: Challenges and Solutions.
    • (2015) Comput. Commun. , vol.68 , pp. 47-60
    • Pimentel, H.M.1    Kopp, S.2    Silveira, R.M.3    Bressan, G.4
  • 95
    • 84969940808 scopus 로고    scopus 로고
    • Security in software defined networks: A survey
    • Ahmad, I., Namal, S., Ylianttila, M., Gurtov, A., Security in software defined networks: A survey. IEEE Commun. Surv. Tutor. 17:4 (2015), 2317–2346, 10.1109/COMST.2015.2474118.
    • (2015) IEEE Commun. Surv. Tutor. , vol.17 , Issue.4 , pp. 2317-2346
    • Ahmad, I.1    Namal, S.2    Ylianttila, M.3    Gurtov, A.4
  • 97
    • 84960954325 scopus 로고    scopus 로고
    • Software-defined network function virtualization: A survey
    • Li, Y., Chen, M., Software-defined network function virtualization: A survey. IEEE Access 3 (2015), 2542–2553, 10.1109/ACCESS.2015.2499271.
    • (2015) IEEE Access , vol.3 , pp. 2542-2553
    • Li, Y.1    Chen, M.2
  • 98
    • 84953392935 scopus 로고    scopus 로고
    • Software-defined mobile networks security
    • Chen, M., Qian, Y., Mao, S., Tang, W., Yang, X., Software-defined mobile networks security. Mob. Netw. Appl., 2016, 1–15, 10.1007/s11036-015-0665-5.
    • (2016) Mob. Netw. Appl. , pp. 1-15
    • Chen, M.1    Qian, Y.2    Mao, S.3    Tang, W.4    Yang, X.5
  • 99
    • 84892438051 scopus 로고    scopus 로고
    • Trust modelling and analysis in peer-to-peer clouds
    • Petri, I., Rana, O.F., Rezgui, Y., Silaghi, G.C., Trust modelling and analysis in peer-to-peer clouds. Int. J. Cloud Comput. 1:2–3 (2012), 221–239, 10.1504/IJCC.2012.046714.
    • (2012) Int. J. Cloud Comput. , vol.1 , Issue.2-3 , pp. 221-239
    • Petri, I.1    Rana, O.F.2    Rezgui, Y.3    Silaghi, G.C.4
  • 100
    • 84894174308 scopus 로고    scopus 로고
    • A trust model using implicit call behavioral graph for mobile cloud computing
    • G. Wang I. Ray D. Feng M. Rajarajan Springer International Publishing
    • Chen, S., Wang, G., Jia, W., A trust model using implicit call behavioral graph for mobile cloud computing. Wang, G., Ray, I., Feng, D., Rajarajan, M., (eds.) Cyberspace Safety and Security Lecture Notes in Computer Science, vol. 8300, 2013, Springer International Publishing, 387–402, 10.1007/978-3-319-03584-0_29.
    • (2013) Cyberspace Safety and Security, Lecture Notes in Computer Science , vol.8300 , pp. 387-402
    • Chen, S.1    Wang, G.2    Jia, W.3
  • 101
    • 84949575608 scopus 로고    scopus 로고
    • Trust in mobile cloud computing with lte-based deployment
    • Proceedings of the IEEE 11th Intl. Conf. Ubiquitous Intelligence and Computing, and IEEE 11th Intl. Conf. on Autonomic and Trusted Computing, and IEEE 14th Intl. Conf. on Scalable Computing and Communications and Its Associated Workshops (UTC-ATC-ScalCom), 2014, pp. 643–648.
    • M. Hussain, B. Almourad, Trust in mobile cloud computing with lte-based deployment, in: Proceedings of the IEEE 11th Intl. Conf. Ubiquitous Intelligence and Computing, and IEEE 11th Intl. Conf. on Autonomic and Trusted Computing, and IEEE 14th Intl. Conf. on Scalable Computing and Communications and Its Associated Workshops (UTC-ATC-ScalCom), 2014, pp. 643–648. http://dx.doi.org/10.1109/UIC-ATC-ScalCom.2014.52.
    • Hussain, M.1    Almourad, B.2
  • 102
    • 84870042316 scopus 로고    scopus 로고
    • A survey of reputation and trust mechanism in peer-to-peer network
    • Proceedings of the 2012 International Conference on Industrial Control and Electronics Engineering, ICICEE, 2012, pp. 116–119.
    • G. Shang-Fu, Z. Jian-Lei, A survey of reputation and trust mechanism in peer-to-peer network, in: Proceedings of the 2012 International Conference on Industrial Control and Electronics Engineering, ICICEE, 2012, pp. 116–119. http://dx.doi.org/10.1109/ICICEE.2012.39.
    • Shang-Fu, G.1    Jian-Lei, Z.2
  • 103
    • 84901427258 scopus 로고    scopus 로고
    • A survey on trust management for Internet of things
    • Yan, Z., Zhang, P., Vasilakos, A.V., A survey on trust management for Internet of things. J. Netw. Comput. Appl. 42 (2014), 120–134, 10.1016/j.jnca.2014.01.014.
    • (2014) J. Netw. Comput. Appl. , vol.42 , pp. 120-134
    • Yan, Z.1    Zhang, P.2    Vasilakos, A.V.3
  • 105
    • 84964292282 scopus 로고    scopus 로고
    • Representation of trust and reputation in self-managed computing systems
    • Proceedings of the IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM’15), 2015, pp. 1827–1834.
    • J. Kantert, S. Edenhofer, S. Tomforde, C. Muller-Schloer, Representation of trust and reputation in self-managed computing systems, in: Proceedings of the IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM’15), 2015, pp. 1827–1834. http://dx.doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.273.
    • Kantert, J.1    Edenhofer, S.2    Tomforde, S.3    Muller-Schloer, C.4
  • 106
    • 84955465738 scopus 로고    scopus 로고
    • A sound approach to security in mobile and cloud-oriented environments
    • Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST), 2015, pp. 1–7.
    • M. Figueroa, K. Uttecht, J. Rosenberg, A sound approach to security in mobile and cloud-oriented environments, in: Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST), 2015, pp. 1–7. http://dx.doi.org/10.1109/THS.2015.7225266.
    • Figueroa, M.1    Uttecht, K.2    Rosenberg, J.3
  • 107
    • 84908407053 scopus 로고    scopus 로고
    • A trust management solution in the context of hybrid clouds
    • Proceedings of the IEEE 23rd International WETICE Conference (WETICE), 2014, pp. 339–344.
    • N. Bennani, K. Boukadi, C. Ghedira-Guegan, A trust management solution in the context of hybrid clouds, in: Proceedings of the IEEE 23rd International WETICE Conference (WETICE), 2014, pp. 339–344. http://dx.doi.org/10.1109/WETICE.2014.76.
    • Bennani, N.1    Boukadi, K.2    Ghedira-Guegan, C.3
  • 108
    • 84964336316 scopus 로고    scopus 로고
    • Friend or foe? detecting and isolating malicious nodes in mobile edge computing platforms
    • IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom’15), 2015, pp. 42–49.
    • A. Mtibaa, K. Harras, H. Alnuweiri, Friend or foe? detecting and isolating malicious nodes in mobile edge computing platforms, in: IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom’15), 2015, pp. 42–49. http://dx.doi.org/10.1109/CloudCom.2015.40.
    • Mtibaa, A.1    Harras, K.2    Alnuweiri, H.3
  • 109
    • 84923009701 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile cloud computing in heterogeneous 5G
    • Gai, K., Qiu, M., Tao, L., Zhu, Y., Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Secur. Commun. Netw. 9:16 (2016), 3049–3058.
    • (2016) Secur. Commun. Netw. , vol.9 , Issue.16 , pp. 3049-3058
    • Gai, K.1    Qiu, M.2    Tao, L.3    Zhu, Y.4
  • 110
    • 84939506714 scopus 로고    scopus 로고
    • Cloudlet mesh for securing mobile clouds from intrusions and network attacks
    • Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015, pp. 109–118.
    • Y. Shi, S. Abhilash, K. Hwang, Cloudlet mesh for securing mobile clouds from intrusions and network attacks, in: Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015, pp. 109–118. http://dx.doi.org/10.1109/MobileCloud.2015.15.
    • Shi, Y.1    Abhilash, S.2    Hwang, K.3
  • 111
  • 113
    • 84938392011 scopus 로고    scopus 로고
    • Federated cloud security architecture for secure and agile clouds
    • K.J. Han B.-Y. Choi S. Song Springer New York
    • Luo, W., Xu, L., Zhan, Z., Zheng, Q., Xu, S., Federated cloud security architecture for secure and agile clouds. Han, K.J., Choi, B.-Y., Song, S., (eds.) High Performance Cloud Auditing and Applications, 2014, Springer, New York, 169–188, 10.1007/978-1-4614-3296-8_7.
    • (2014) High Performance Cloud Auditing and Applications , pp. 169-188
    • Luo, W.1    Xu, L.2    Zhan, Z.3    Zheng, Q.4    Xu, S.5
  • 114
    • 84955587196 scopus 로고    scopus 로고
    • Threat analysis and misuse patterns of federated inter-cloud systems
    • Proceedings of the 19th European Conference on Pattern Languages of Programs (EuroPLoP), 2014, pp. 13:1–13:8.
    • C.O. Encina, E.B. Fernandez, A.R. Monge, Threat analysis and misuse patterns of federated inter-cloud systems, in: Proceedings of the 19th European Conference on Pattern Languages of Programs (EuroPLoP), 2014, pp. 13:1–13:8. http://dx.doi.org/10.1145/2721956.2721986.
    • Encina, C.O.1    Fernandez, E.B.2    Monge, A.R.3
  • 115
    • 84944184710 scopus 로고    scopus 로고
    • PiMiCo: Privacy preservation via migration in collaborative mobile clouds
    • Proceedings of the 48th Hawaii International Conference on System Sciences (HICSS), 2015, pp. 5341–5351.
    • K. Ravichandran, A. Gavrilovska, S. Pande, PiMiCo: Privacy preservation via migration in collaborative mobile clouds, in: Proceedings of the 48th Hawaii International Conference on System Sciences (HICSS), 2015, pp. 5341–5351. http://dx.doi.org/10.1109/HICSS.2015.628.
    • Ravichandran, K.1    Gavrilovska, A.2    Pande, S.3
  • 116
    • 84924663051 scopus 로고    scopus 로고
    • Mobile cloud computing based privacy protection in location-based information survey applications
    • Zhang, H., Yu, N., Wen, Y., Mobile cloud computing based privacy protection in location-based information survey applications. Secur. Commun. Netw. 8:6 (2015), 1006–1025, 10.1002/sec.1055.
    • (2015) Secur. Commun. Netw. , vol.8 , Issue.6 , pp. 1006-1025
    • Zhang, H.1    Yu, N.2    Wen, Y.3
  • 117
    • 85000613745 scopus 로고    scopus 로고
    • Software defined networking with pseudonym systems for secure vehicular clouds
    • Huang, X., Yu, R., Kang, J., Wang, N., Maharjan, S., Zhang, Y., Software defined networking with pseudonym systems for secure vehicular clouds. IEEE Access 4 (2016), 3522–3534, 10.1109/ACCESS.2016.2560902.
    • (2016) IEEE Access , vol.4 , pp. 3522-3534
    • Huang, X.1    Yu, R.2    Kang, J.3    Wang, N.4    Maharjan, S.5    Zhang, Y.6
  • 118
    • 84922777386 scopus 로고    scopus 로고
    • Trust modelling and analysis in peer-to-peer clouds
    • Cruz Zapata, B., Fernandez-Aleman, J.L., Toval, A., Trust modelling and analysis in peer-to-peer clouds. Comput. Sci. Inf. Syst. 12:1 (2015), 161–184, 10.2298/CSIS140205086C.
    • (2015) Comput. Sci. Inf. Syst. , vol.12 , Issue.1 , pp. 161-184
    • Cruz Zapata, B.1    Fernandez-Aleman, J.L.2    Toval, A.3
  • 119
    • 85027086227 scopus 로고    scopus 로고
    • Security for Cloud Computing
    • Artec House Boston
    • Di Pietro, R., Lombardi, F., Security for Cloud Computing. 2015, Artec House, Boston 978-1-60807-989-6.
    • (2015)
    • Di Pietro, R.1    Lombardi, F.2
  • 120
    • 84935007320 scopus 로고    scopus 로고
    • Data security and privacy in cloud computing
    • (Article ID 190903)
    • Sun, Y., Zhang, J., Xiong, Y., Zhu, G., Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw. 2014 (2014), 1–9, 10.1155/2014/190903 (Article ID 190903).
    • (2014) Int. J. Distrib. Sens. Netw. , vol.2014 , pp. 1-9
    • Sun, Y.1    Zhang, J.2    Xiong, Y.3    Zhu, G.4
  • 121
    • 84883025016 scopus 로고    scopus 로고
    • Personal cloudlets for privacy and resource efficiency in mobile in-app advertising
    • Proceedings of the 1st International Workshop on Mobile Cloud Computing and Networking (MobileCloud), 2013, pp. 33–40.
    • S. Seneviratne, A. Seneviratne, P. Mohapatra, Personal cloudlets for privacy and resource efficiency in mobile in-app advertising, in: Proceedings of the 1st International Workshop on Mobile Cloud Computing and Networking (MobileCloud), 2013, pp. 33–40. http://dx.doi.org/10.1145/2492348.2492356.
    • Seneviratne, S.1    Seneviratne, A.2    Mohapatra, P.3
  • 122
    • 84937054511 scopus 로고    scopus 로고
    • Cloud-based secure health monitoring: Optimizing fully-homomorphic encryption for streaming algorithms
    • Proceedings of the 2014 Globecom Workshops, 2014, pp. 48–52.
    • A. Page, O. Kocabas, S. Ames, M. Venkitasubramaniam, T. Soyata, Cloud-based secure health monitoring: Optimizing fully-homomorphic encryption for streaming algorithms, in: Proceedings of the 2014 Globecom Workshops, 2014, pp. 48–52. http://dx.doi.org/10.1109/GLOCOMW.2014.7063384.
    • Page, A.1    Kocabas, O.2    Ames, S.3    Venkitasubramaniam, M.4    Soyata, T.5
  • 123
    • 84936802513 scopus 로고    scopus 로고
    • Privacy using mobile cloud computing
    • Proceedings of the 5th International Conference on Digital Information and Communication Technology and its Applications (DICTAP), 2015, 178–182.
    • J. Abdo, J. Demerjian, H. Chaouchi, T. Atechian, C. Bassil, Privacy using mobile cloud computing, in: Proceedings of the 5th International Conference on Digital Information and Communication Technology and its Applications (DICTAP), 2015, 178–182. http://dx.doi.org/10.1109/DICTAP.2015.7113194.
    • Abdo, J.1    Demerjian, J.2    Chaouchi, H.3    Atechian, T.4    Bassil, C.5
  • 124
    • 84997089333 scopus 로고    scopus 로고
    • Virtualization and cloud security: benefits, caveats, and future developments
    • Springer International Publishing
    • Lombardi, F., Di Pietro, R., Virtualization and cloud security: benefits, caveats, and future developments. Cloud Computing: Challenges, Limitations and R&D Solutions, 2014, Springer International Publishing, 237–255, 10.1007/978-3-319-10530-7_10.
    • (2014) Cloud Computing: Challenges, Limitations and R&D Solutions , pp. 237-255
    • Lombardi, F.1    Di Pietro, R.2
  • 125
    • 84910156435 scopus 로고    scopus 로고
    • L. van Doorn, vTPM: Virtualizing the trusted platform module, in: Proceedings of the 15th Conference on USENIX Security Symposium (USENIX-SS’06)
    • S. Berger, R. Cáceres, K.A. Goldman, R. Perez, R. Sailer, L. van Doorn, vTPM: Virtualizing the trusted platform module, in: Proceedings of the 15th Conference on USENIX Security Symposium (USENIX-SS’06), 2006.
    • (2006)
    • Berger, S.1    Cáceres, R.2    Goldman, K.A.3    Perez, R.4    Sailer, R.5
  • 127
    • 84904489078 scopus 로고    scopus 로고
    • Secure live virtual machines migration: Issues and solutions
    • 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA’14), 2014, PP. 160–165.
    • M. Aiash, G. Mapp, O. Gemikonakli, Secure live virtual machines migration: Issues and solutions, in: 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA’14), 2014, PP. 160–165. http://dx.doi.org/10.1109/WAINA.2014.35.
    • Aiash, M.1    Mapp, G.2    Gemikonakli, O.3
  • 129
    • 84954289899 scopus 로고    scopus 로고
    • SMOC: A secure mobile cloud computing platform
    • Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), 2015, pp. 2668–2676.
    • Z. Hao, Y. Tang, Y. Zhang, E. Novak, N. Carter, Q. Li, SMOC: A secure mobile cloud computing platform, in: Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), 2015, pp. 2668–2676. http://dx.doi.org/10.1109/INFOCOM.2015.7218658.
    • Hao, Z.1    Tang, Y.2    Zhang, Y.3    Novak, E.4    Carter, N.5    Li, Q.6
  • 130
    • 84983428951 scopus 로고    scopus 로고
    • Adaptive and secure application partitioning for offloading in mobile cloud computing
    • J.H. Abawajy S. Mukherjea S.M. Thampi A. Ruiz-Martnez Springer International Publishing
    • Dhanya, N.M., Kousalya, G., Adaptive and secure application partitioning for offloading in mobile cloud computing. Abawajy, J.H., Mukherjea, S., Thampi, S.M., Ruiz-Martnez, A., (eds.) Security in Computing and Communications Communications in Computer and Information Science, vol. 536, 2015, Springer International Publishing, 45–53, 10.1007/978-3-319-22915-7_5.
    • (2015) Security in Computing and Communications, Communications in Computer and Information Science , vol.536 , pp. 45-53
    • Dhanya, N.M.1    Kousalya, G.2
  • 131
    • 84939507944 scopus 로고    scopus 로고
    • Avatar: Mobile distributed computing in the cloud
    • Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015, pp. 151–156.
    • C. Borcea, X. Ding, N. Gehani, R. Curtmola, M. Khan, H. Debnath, Avatar: Mobile distributed computing in the cloud, in: Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015, pp. 151–156. http://dx.doi.org/10.1109/MobileCloud.2015.22.
    • Borcea, C.1    Ding, X.2    Gehani, N.3    Curtmola, R.4    Khan, M.5    Debnath, H.6
  • 132
    • 84930511409 scopus 로고    scopus 로고
    • Cloud forensics: Technical challenges, solutions and comparative analysis
    • Pichan, A., Lazarescu, M., Soh, S.T., Cloud forensics: Technical challenges, solutions and comparative analysis. Digit. Invest. 13 (2015), 38–57, 10.1016/j.diin.2015.03.002.
    • (2015) Digit. Invest. , vol.13 , pp. 38-57
    • Pichan, A.1    Lazarescu, M.2    Soh, S.T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.