메뉴 건너뛰기




Volumn 4, Issue 2, 2017, Pages 13-17

Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective

Author keywords

cloud and the law; cloud computing; edge computing; Internet of Things (IoT); security; sensor network

Indexed keywords

CLOUD COMPUTING; DIGITAL STORAGE; INTERNET OF THINGS; NETWORK FUNCTION VIRTUALIZATION; SENSOR NETWORKS;

EID: 85019262177     PISSN: None     EISSN: 23256095     Source Type: Trade Journal    
DOI: 10.1109/MCC.2017.30     Document Type: Article
Times cited : (124)

References (21)
  • 2
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of Things: A survey
    • October
    • L. Atzori, A. Iera, and Giacomo Morabito, "The Internet of Things: A survey", Computer Networks, vol. 54, no. 15, pp. 2787-2805, October 2010.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 4
    • 84888842651 scopus 로고    scopus 로고
    • Interconnecting Federated Clouds by Using Publish-Subscribe Service
    • December
    • C. Esposito, M. Ficco, F. Palmieri, and A. Cas-tiglione, "Interconnecting Federated Clouds by Using Publish-Subscribe Service", Cluster Computing, vol. 16, no. 5, pp. 887-903, December 2013.
    • (2013) Cluster Computing , vol.16 , Issue.5 , pp. 887-903
    • Esposito, C.1    Ficco, M.2    Palmieri, F.3    Cas-Tiglione, A.4
  • 5
    • 84986211321 scopus 로고    scopus 로고
    • Fog Computing: Helping the Internet of Things Realize Its Potential
    • August
    • A. V. Dastjerdi, and R. Buyya, "Fog Computing: Helping the Internet of Things Realize Its Potential", Computer, vol. 49, no. 8, pp. 112-116, August 2016.
    • (2016) Computer , vol.49 , Issue.8 , pp. 112-116
    • Dastjerdi, A.V.1    Buyya, R.2
  • 6
    • 85010075862 scopus 로고    scopus 로고
    • Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption
    • December
    • R. Deng, R. Lu, C. Lai, T H. Luan, and H. Liang, "Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption", IEEE Internet of Things Journal, vol. 3, no. 6, pp. 1171-1181, December 2016.
    • (2016) IEEE Internet of Things Journal , vol.3 , Issue.6 , pp. 1171-1181
    • Deng, R.1    Lu, R.2    Lai, C.3    Luan, T.H.4    Liang, H.5
  • 10
  • 11
    • 84992533091 scopus 로고    scopus 로고
    • Stackelberg game based relay selection for physical layer security and energy effciency enhancement in cognitive radio networks
    • March
    • H. Fang, L. Xu, and K.-K.R. Choo, "Stackelberg game based relay selection for physical layer security and energy effciency enhancement in cognitive radio networks", Applied Mathematics and Computation, vol. 296, pp. 153-167, March 2017.
    • (2017) Applied Mathematics and Computation , vol.296 , pp. 153-167
    • Fang, H.1    Xu, L.2    Choo, K.-K.R.3
  • 12
    • 85027930576 scopus 로고    scopus 로고
    • An adaptive trust-Stackelberg game model for security and energy effciency in dynamic cognitive radio networks
    • H. Fang, L. Xu, J. Li, and K.-K.R. Choo, "An adaptive trust-Stackelberg game model for security and energy effciency in dynamic cognitive radio networks", Computer Communications, 2 0 1 7 .
    • (2017) Computer Communications
    • Fang, H.1    Xu, L.2    Li, J.3    Choo, K.-K.R.4
  • 13
    • 84919800484 scopus 로고    scopus 로고
    • Implementation of a New Lightweight Encryption Design for Embedded Security
    • January
    • G. Bansod, N. Raval, and N. Pisharoty, "Implementation of a New Lightweight Encryption Design for Embedded Security", IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 142-151, January 2015.
    • (2015) IEEE Transactions on Information Forensics and Security , vol.10 , Issue.1 , pp. 142-151
    • Bansod, G.1    Raval, N.2    Pisharoty, N.3
  • 14
    • 84995919538 scopus 로고    scopus 로고
    • A survey of Cloud computing data integrity schemes: Design challenges, taxonomy and future trends
    • March
    • F. Zafar et al., "A survey of Cloud computing data integrity schemes: Design challenges, taxonomy and future trends", Computers & Security, vol. 65, pp. 29-49, March 2017.
    • (2017) Computers & Security , vol.65 , pp. 29-49
    • Zafar, F.1
  • 15
    • 84907448566 scopus 로고    scopus 로고
    • A Survey of Provably Secure Searchable Encryption
    • August
    • C. Bösch, P. Hartel, W. Jonker, and A. Peter, "A Survey of Provably Secure Searchable Encryption", ACM Computing Surveys, vol. 47, no. 2, art. 18, August 2014.
    • (2014) ACM Computing Surveys , vol.47 , Issue.2
    • Bösch, C.1    Hartel, P.2    Jonker, W.3    Peter, A.4
  • 17
    • 79953294892 scopus 로고    scopus 로고
    • Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
    • May
    • Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", in IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
    • (2011) In IEEE Transactions on Parallel and Distributed Systems , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 21
    • 85009103544 scopus 로고    scopus 로고
    • Healthcare-Related Data in the Cloud: Challenges and Opportunities
    • Nov.-Dec.
    • V. Casola, A. Castiglione, K. K. R. Choo and C. Esposito, "Healthcare-Related Data in the Cloud: Challenges and Opportunities", IEEE Cloud Computing, vol. 3, no. 6, pp. 10-14, Nov.-Dec. 2016.
    • (2016) IEEE Cloud Computing , vol.3 , Issue.6 , pp. 10-14
    • Casola, V.1    Castiglione, A.2    Choo, K.K.R.3    Esposito, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.