메뉴 건너뛰기




Volumn 78, Issue , 2018, Pages 677-679

A foggy research future: Advances and future opportunities in fog computing research

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85029605430     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2017.09.014     Document Type: Editorial
Times cited : (38)

References (35)
  • 1
    • 85019262177 scopus 로고    scopus 로고
    • Challenges of connecting edge and cloud computing: A security and forensic perspective
    • Esposito, Christian, Castiglione, Aniello, Pop, Florin, Choo, Kim-Kwang Raymond, Challenges of connecting edge and cloud computing: A security and forensic perspective. IEEE Cloud Comput. 4:2 (2017), 13–17.
    • (2017) IEEE Cloud Comput. , vol.4 , Issue.2 , pp. 13-17
    • Esposito, C.1    Castiglione, A.2    Pop, F.3    Choo, K.-K.R.4
  • 2
    • 85026636505 scopus 로고    scopus 로고
    • From cloud to fog computing: A review and a conceptual live VM migration framework
    • Osanaiye, Opeyemi A., Chen, Shuo, Yan, Zheng, Lu, Rongxing, Choo, Kim-Kwang Raymond, Dlodlo, Mqhele E., From cloud to fog computing: A review and a conceptual live VM migration framework. IEEE Access 5 (2017), 8284–8300.
    • (2017) IEEE Access , vol.5 , pp. 8284-8300
    • Osanaiye, O.A.1    Chen, S.2    Yan, Z.3    Lu, R.4    Choo, K.-K.R.5    Dlodlo, M.E.6
  • 3
    • 85017346299 scopus 로고    scopus 로고
    • Cloud of things in smart agriculture: Intelligent irrigation monitoring by thermal imaging
    • Roopaei, Mehdi, Rad, Paul, Choo, Kim-Kwang Raymond, Cloud of things in smart agriculture: Intelligent irrigation monitoring by thermal imaging. IEEE Cloud Comput. 4:1 (2017), 10–15.
    • (2017) IEEE Cloud Comput. , vol.4 , Issue.1 , pp. 10-15
    • Roopaei, M.1    Rad, P.2    Choo, K.-K.R.3
  • 4
    • 85010075862 scopus 로고    scopus 로고
    • Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption
    • Deng, Ruilong, Lu, Rongxing, Lai, Chengzhe, Luan, Tom H., Liang, Hao, Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption. IEEE Internet of Things J. 3:6 (2016), 1171–1181.
    • (2016) IEEE Internet of Things J. , vol.3 , Issue.6 , pp. 1171-1181
    • Deng, R.1    Lu, R.2    Lai, C.3    Luan, T.H.4    Liang, H.5
  • 5
    • 85015097035 scopus 로고    scopus 로고
    • A cross tenant access control (CTAC) model for cloud computing: Formal specification and verification
    • Alam, Quratulain, Malik, Saif Ur Rehman, Akhunzada, Adnan, Choo, Kim-Kwang Raymond, Tabbasum, Saher, Alam, Masoom, A cross tenant access control (CTAC) model for cloud computing: Formal specification and verification. IEEE Trans. Inf. Forensics Secur. 12:6 (2017), 1259–1268.
    • (2017) IEEE Trans. Inf. Forensics Secur. , vol.12 , Issue.6 , pp. 1259-1268
    • Alam, Q.1    Malik, S.U.R.2    Akhunzada, A.3    Choo, K.-K.R.4    Tabbasum, S.5    Alam, M.6
  • 6
    • 84863151459 scopus 로고    scopus 로고
    • End-to-end policy-based encryption and management of data in the cloud
    • Pearson, Siani, Mont, Marco Casassa, Chen, Liqun, Reed, Archie, End-to-end policy-based encryption and management of data in the cloud. CloudCom, 2011, 764–771.
    • (2011) CloudCom , pp. 764-771
    • Pearson, S.1    Mont, M.C.2    Chen, L.3    Reed, A.4
  • 7
    • 84956692534 scopus 로고    scopus 로고
    • Protecting outsourced data in cloud computing through access management
    • Wang, Hua, Yi, Xun, Bertino, Elisa, Sun, Lili, Protecting outsourced data in cloud computing through access management. Concurrency, Pract. Exp. 28:3 (2016), 600–615.
    • (2016) Concurrency, Pract. Exp. , vol.28 , Issue.3 , pp. 600-615
    • Wang, H.1    Yi, X.2    Bertino, E.3    Sun, L.4
  • 8
    • 85008245198 scopus 로고    scopus 로고
    • Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
    • Roman, Rodrigo, Lopez, Javier, Mambo, Masahiro, Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78 (2018), 680–698, 10.1016/j.future.2016.11.009.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 680-698
    • Roman, R.1    Lopez, J.2    Mambo, M.3
  • 9
    • 84894278511 scopus 로고    scopus 로고
    • End-to-end policy based encryption techniques for multi-party data management
    • Beiter, Michael, Mont, Marco Casassa, Chen, Liqun, Pearson, Siani, End-to-end policy based encryption techniques for multi-party data management. Comput. Stand. Interfaces 36:4 (2014), 689–703.
    • (2014) Comput. Stand. Interfaces , vol.36 , Issue.4 , pp. 689-703
    • Beiter, M.1    Mont, M.C.2    Chen, L.3    Pearson, S.4
  • 11
    • 84904595350 scopus 로고    scopus 로고
    • A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
    • Choo, Kim-Kwang Raymond, Nam, Junghyun, Won, Dongho, A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Inf. Sci. 281 (2014), 182–200.
    • (2014) Inf. Sci. , vol.281 , pp. 182-200
    • Choo, K.-K.R.1    Nam, J.2    Won, D.3
  • 12
    • 85009274837 scopus 로고    scopus 로고
    • An efficient access control scheme with outsourcing capability and attribute update for fog computing
    • Zhang, Peng, Chen, Zehong, Liu, Joseph K., Liang, Kaitai, Liu, Hongwei, An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener. Comput. Syst. 78 (2018), 753–762, 10.1016/j.future.2016.12.015.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 753-762
    • Zhang, P.1    Chen, Z.2    Liu, J.K.3    Liang, K.4    Liu, H.5
  • 13
    • 85016477377 scopus 로고    scopus 로고
    • A variant of password authenticated key exchange protocol
    • Zhang, Yuexin, Xiang, Yang, Wu, Wei, Alelaiwi, Abdulhameed, A variant of password authenticated key exchange protocol. Future Gener. Comput. Syst. 78 (2018), 699–711, 10.1016/j.future.2017.02.016.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 699-711
    • Zhang, Y.1    Xiang, Y.2    Wu, W.3    Alelaiwi, A.4
  • 14
    • 85014042880 scopus 로고    scopus 로고
    • Anonymous and secure aggregation scheme in fog-based public cloud computing
    • Wang, Huaqun, Wang, Zhiwei, Domingo-Ferrer, Josep, Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gener. Comput. Syst. 78 (2018), 712–719, 10.1016/j.future.2017.02.032.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 712-719
    • Wang, H.1    Wang, Z.2    Domingo-Ferrer, J.3
  • 15
    • 85011878988 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
    • Jiang, Yinhao, Susilo, Willy, Mu, Yi, Guo, Fuchun, Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener. Comput. Syst. 78 (2018), 720–729, 10.1016/j.future.2017.01.026.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 720-729
    • Jiang, Y.1    Susilo, W.2    Mu, Y.3    Guo, F.4
  • 16
    • 85029576091 scopus 로고    scopus 로고
    • CCA-secure ABE with outsourced decryption for fog computing
    • Zuo, Cong, Shao, Jun, Wei, Guiyi, Xie, Mande, Ji, Min, CCA-secure ABE with outsourced decryption for fog computing. Future Gener. Comput. Syst. 78 (2018), 730–738, 10.1016/j.future.2016.10.028.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 730-738
    • Zuo, C.1    Shao, J.2    Wei, G.3    Xie, M.4    Ji, M.5
  • 17
    • 85021436057 scopus 로고    scopus 로고
    • Position based cryptography with location privacy: A step for Fog Computing
    • Yang, Rupeng, Xu, Qiuliang, Au, Man Ho, Yu, Zuoxia, Wang, Hao, Zhou, Lu, Position based cryptography with location privacy: A step for Fog Computing. Future Gener. Comput. Syst. 78 (2018), 799–806, 10.1016/j.future.2017.05.035.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 799-806
    • Yang, R.1    Xu, Q.2    Au, M.H.3    Yu, Z.4    Wang, H.5    Zhou, L.6
  • 18
    • 85029577650 scopus 로고    scopus 로고
    • Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud
    • Yang, Xue, Lu, Rongxing, Choo, Kim Kwang Raymond, Yin, Fan, Tang, Xiaohu, Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud. IEEE Trans. Big Data, 2017, 10.1109/TBDATA.2017.2721444.
    • (2017) IEEE Trans. Big Data
    • Yang, X.1    Lu, R.2    Choo, K.K.R.3    Yin, F.4    Tang, X.5
  • 19
    • 85011277966 scopus 로고    scopus 로고
    • Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing
    • Koo, Dongyoung, Hur, Junbeom, Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Future Gener. Comput. Syst. 78 (2018), 739–752, 10.1016/j.future.2017.01.024.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 739-752
    • Koo, D.1    Hur, J.2
  • 20
    • 85011802339 scopus 로고    scopus 로고
    • Towards leakage-resilient fine-grained access control in fog computing
    • Yu, Zuoxia, Au, Man Ho, Xu, Qiuliang, Yang, Rupeng, Han, Jinguang, Towards leakage-resilient fine-grained access control in fog computing. Future Gener. Comput. Syst. 78 (2018), 763–777, 10.1016/j.future.2017.01.025.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 763-777
    • Yu, Z.1    Au, M.H.2    Xu, Q.3    Yang, R.4    Han, J.5
  • 21
    • 85013421978 scopus 로고    scopus 로고
    • Secure intelligent traffic light control using fog computing
    • Liu, Jian, Li, Jiangtao, Zhang, Lei, Dai, Feifei, Zhang, Yuanfei, Meng, Xinyu, Shen, Jian, Secure intelligent traffic light control using fog computing. Future Gener. Comput. Syst. 78 (2018), 817–824, 10.1016/j.future.2017.02.017.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 817-824
    • Liu, J.1    Li, J.2    Zhang, L.3    Dai, F.4    Zhang, Y.5    Meng, X.6    Shen, J.7
  • 22
    • 85016064811 scopus 로고    scopus 로고
    • Hybrid privacy-preserving clinical decision support system in fog–cloud computing
    • Liu, Ximeng, Deng, Robert H., Yang, Yang, Tran, Hieu N., Zhong, Shangping, Hybrid privacy-preserving clinical decision support system in fog–cloud computing. Future Gener. Comput. Syst. 78 (2018), 825–837, 10.1016/j.future.2017.03.018.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 825-837
    • Liu, X.1    Deng, R.H.2    Yang, Y.3    Tran, H.N.4    Zhong, S.5
  • 23
    • 85015916813 scopus 로고    scopus 로고
    • Verifiable searchable encryption with aggregate keys for data sharing system
    • Liu, Zheli, Li, Tong, Li, Ping, Jia, Chunfu, Li, Jin, Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener. Comput. Syst. 78 (2018), 778–788, 10.1016/j.future.2017.0.2024.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 778-788
    • Liu, Z.1    Li, T.2    Li, P.3    Jia, C.4    Li, J.5
  • 24
    • 85034216876 scopus 로고    scopus 로고
    • Fuzzy identity-based data integrity auditing for reliable cloud storage systems
    • Li, Yannan, Yu, Yong, Min, Geyong, Susilo, Willy, Ni, Jianbing, Choo, Kim-Kwang Raymond, Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure Comput., 2017, 10.1109/TDSC.2017.2662216.
    • (2017) IEEE Trans. Dependable Secure Comput.
    • Li, Y.1    Yu, Y.2    Min, G.3    Susilo, W.4    Ni, J.5    Choo, K.-K.R.6
  • 25
    • 84992083560 scopus 로고    scopus 로고
    • Privacy preserving cloud data auditing with efficient key update
    • Li, Yannan, Yu, Yong, Yang, Bo, Min, Geyong, Wu, Huai, Privacy preserving cloud data auditing with efficient key update. Future Gener. Comput. Syst. 78 (2018), 789–798, 10.1016/j.future.2016.09.003.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 789-798
    • Li, Y.1    Yu, Y.2    Yang, B.3    Min, G.4    Wu, H.5
  • 26
    • 85010543298 scopus 로고    scopus 로고
    • Controlling and filtering users data in intelligent transportation system
    • Gosman, Catalin, Cornea, Tudor, Dobre, Ciprian, Pop, Florin, Castiglione, Aniello, Controlling and filtering users data in intelligent transportation system. Future Gener. Comput. Syst. 78 (2018), 807–816, 10.1016/j.future.2016.12.014.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 807-816
    • Gosman, C.1    Cornea, T.2    Dobre, C.3    Pop, F.4    Castiglione, A.5
  • 27
    • 85017399480 scopus 로고    scopus 로고
    • Universal and secure object ownership transfer protocol for the internet of things
    • Ray, Biplob R., Abawajy, Jemal, Chowdhury, Morshed, Alelaiwi, Abdulhameed, Universal and secure object ownership transfer protocol for the internet of things. Future Gener. Comput. Syst. 78 (2018), 838–849, 10.1016/j.future.2017.02.020.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 838-849
    • Ray, B.R.1    Abawajy, J.2    Chowdhury, M.3    Alelaiwi, A.4
  • 28
    • 85008226728 scopus 로고    scopus 로고
    • Bitcoin-based fair payments for outsourcing computations of fog devices
    • Huang, Hui, Chen, Xiaofeng, Wu, Qianhong, Huang, Xinyi, Shen, Jian, Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78 (2018), 850–858, 10.1016/j.future.2016.12.016.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 850-858
    • Huang, H.1    Chen, X.2    Wu, Q.3    Huang, X.4    Shen, J.5
  • 29
    • 84973885505 scopus 로고    scopus 로고
    • Secure data analytics for cloud-integrated internet of things applications
    • Kumarage, Heshan, Khalil, Ibrahim, Alabdulatif, Abdulatif, Tari, Zahir, Yi, Xun, Secure data analytics for cloud-integrated internet of things applications. IEEE Cloud Computing 3:2 (2016), 46–56.
    • (2016) IEEE Cloud Computing , vol.3 , Issue.2 , pp. 46-56
    • Kumarage, H.1    Khalil, I.2    Alabdulatif, A.3    Tari, Z.4    Yi, X.5
  • 30
    • 85018495637 scopus 로고    scopus 로고
    • A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT
    • Lu, Rongxing, Heung, Kevin, Lashkari, Arash Habibi, Ghorbani, Ali A., A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5 (2017), 3302–3312.
    • (2017) IEEE Access , vol.5 , pp. 3302-3312
    • Lu, R.1    Heung, K.2    Lashkari, A.H.3    Ghorbani, A.A.4
  • 31
    • 85006981923 scopus 로고    scopus 로고
    • Privacy-preserved big data analysis based on asymmetric imputation kernels and multiside similarities
    • Chen, Bo-Wei, Rho, Seungmin, Yang, Laurence T., Gu, Yu, Privacy-preserved big data analysis based on asymmetric imputation kernels and multiside similarities. Future Gener. Comput. Syst. 78 (2018), 859–866, 10.1016/j.future.2016.11.008.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 859-866
    • Chen, B.-W.1    Rho, S.2    Yang, L.T.3    Gu, Y.4
  • 33
    • 85029348815 scopus 로고    scopus 로고
    • George Grispos, William Bradley Glisson, Kim-Kwang Raymond Choo, Medical cyber-physical systems development: A forensics-driven approach, in: Proceedings of IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE, Philadelphia, Pennsylvania, USA, 17–19 July 2017, pp. 108–114.
    • George Grispos, William Bradley Glisson, Kim-Kwang Raymond Choo, Medical cyber-physical systems development: A forensics-driven approach, in: Proceedings of IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE, Philadelphia, Pennsylvania, USA, 17–19 July 2017, pp. 108–114.
  • 34
    • 84963728330 scopus 로고    scopus 로고
    • Forensic-by-design framework for cyber-physical cloud systems
    • Rahman, Nurul Hidayah Ab, Glisson, William Bradley, Yang, Yanjiang, Choo, Kim-Kwang Raymond, Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Comput. 3:1 (2016), 50–59.
    • (2016) IEEE Cloud Comput. , vol.3 , Issue.1 , pp. 50-59
    • Rahman, N.H.A.1    Glisson, W.B.2    Yang, Y.3    Choo, K.-K.R.4
  • 35
    • 84971492452 scopus 로고    scopus 로고
    • Cloud incident handling and forensic-by-design: cloud storage as a case study
    • Rahman, Nurul Hidayah Ab, Cahyani, Niken Dwi Wahyu, Choo, Kim-Kwang Raymond, Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurrency, Comput.: Pract. Exp., 29(14), 2017.
    • (2017) Concurrency, Comput.: Pract. Exp. , vol.29 , Issue.14
    • Rahman, N.H.A.1    Cahyani, N.D.W.2    Choo, K.-K.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.