메뉴 건너뛰기




Volumn 35, Issue 11, 2017, Pages 2586-2595

The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective

Author keywords

Cloud computing; Cloud resilience; Cloud security; Edge computing; Fog computing; Mobile edge computing

Indexed keywords

BIOLOGICAL SYSTEMS; CLOUD COMPUTING; DISTRIBUTED COMPUTER SYSTEMS; FOG; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK ARCHITECTURE;

EID: 85031824407     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2017.2760478     Document Type: Review
Times cited : (253)

References (57)
  • 2
    • 85038945903 scopus 로고    scopus 로고
    • Why Cloud Computing Should be at the Heart of Your Business
    • Why Cloud Computing Should be at the Heart of Your Business. [Online]. Available: http://www.telegraph.co.uk/business/ready-andenabled/cloud-computing/
  • 4
    • 85038885538 scopus 로고    scopus 로고
    • Feb.
    • L. Reading. (Feb. 2012). Orange/Sita Cloud Prepares for Takeoff. [Online]. Available: http://www.lightreading.com/services-apps/cloudservices/orange-sita-cloud-prepares-for-takeoff/d/d-id/693612
    • (2012) Orange/Sita Cloud Prepares for Takeoff
    • Reading, L.1
  • 6
    • 84954123634 scopus 로고    scopus 로고
    • Review and analysis of networking challenges in cloud computing
    • Jan.
    • J. Moura and D. Hutchison, "Review and analysis of networking challenges in cloud computing, " J. Netw. Comput. Appl., vol. 60, pp. 113-129, Jan. 2016.
    • (2016) J. Netw. Comput. Appl. , vol.60 , pp. 113-129
    • Moura, J.1    Hutchison, D.2
  • 9
    • 84952318359 scopus 로고    scopus 로고
    • Managing IT operations in a clouddriven enterprise: Case studies
    • R. P. Padhy and M. R. Patra, "Managing IT operations in a clouddriven enterprise: Case studies, " Amer. J. Cloud Comput., vol. 1, no. 1, pp. 1-18, 2013.
    • (2013) Amer. J. Cloud Comput. , vol.1 , Issue.1 , pp. 1-18
    • Padhy, R.P.1    Patra, M.R.2
  • 10
    • 85015323275 scopus 로고    scopus 로고
    • Cloud computing: A survey on its limitations and potential solutions
    • M. M. Islam, S. Morshed, P. Goswami, and B. Dhaka, "Cloud computing: A survey on its limitations and potential solutions, " Int. J. Comput. Sci. Issues, vol. 10, no. 4, pp. 159-163, 2013.
    • (2013) Int. J. Comput. Sci. Issues , vol.10 , Issue.4 , pp. 159-163
    • Islam, M.M.1    Morshed, S.2    Goswami, P.3    Dhaka, B.4
  • 11
    • 84977268028 scopus 로고    scopus 로고
    • Edge-centric computing: Vision and challenges
    • P. G. Lopez et al., "Edge-centric computing: Vision and challenges, " ACM SIGCOMM Comput. Commun. Rev., vol. 45, no. 5, pp. 37-42, 2015.
    • (2015) ACM SIGCOMM Comput. Commun. Rev. , vol.45 , Issue.5 , pp. 37-42
    • Lopez, P.G.1
  • 13
    • 84888322916 scopus 로고    scopus 로고
    • A survey of mobile cloud computing: Architecture, applications, and approaches
    • Dec.
    • H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing: Architecture, applications, and approaches, " Wireless Commun. Mobile Comput., vol. 13, no. 18, pp. 1587-1611, Dec. 2013. [Online]. Available: http://dx.doi.org/10.1002/wcm.1203
    • (2013) Wireless Commun. Mobile Comput. , vol.13 , Issue.18 , pp. 1587-1611
    • Dinh, H.T.1    Lee, C.2    Niyato, D.3    Wang, P.4
  • 17
    • 84890363428 scopus 로고    scopus 로고
    • Critical cloud computing-A CIIP perspective on cloud computing services
    • Agency, Heraklion, Greece, Tech. Rep.
    • M. Dekker, "Critical cloud computing-A CIIP perspective on cloud computing services, " Eur. Netw. Inf. Secur. Agency, Heraklion, Greece, Tech. Rep., 2012.
    • (2012) Eur. Netw. Inf. Secur.
    • Dekker, M.1
  • 19
    • 84905989927 scopus 로고    scopus 로고
    • Extending the cloud with fog: Security challenges & opportunities
    • J. Shropshire, "Extending the cloud with fog: Security challenges & opportunities, " in Proc. 20th Amer. Conf. Inf. Syst., 2014, pp. 1-10.
    • (2014) Proc. 20th Amer. Conf. Inf. Syst. , pp. 1-10
    • Shropshire, J.1
  • 21
    • 77953248995 scopus 로고    scopus 로고
    • Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines
    • J. P. Sterbenz et al., "Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines, " Comput. Netw., vol. 54, no. 8, pp. 1245-1265, 2010.
    • (2010) Comput. Netw. , vol.54 , Issue.8 , pp. 1245-1265
    • Sterbenz, J.P.1
  • 23
    • 84904576706 scopus 로고    scopus 로고
    • Elasticity in cloud computing: What it is, and what it is not
    • N. R. Herbst, S. Kounev, and R. H. Reussner, "Elasticity in cloud computing: What it is, and what it is not, " in Proc. ICAC, 2013, pp. 23-27.
    • (2013) Proc. ICAC , pp. 23-27
    • Herbst, N.R.1    Kounev, S.2    Reussner, R.H.3
  • 25
    • 84903602200 scopus 로고    scopus 로고
    • Providing dependability and resilience in the cloud: Challenges and opportunities
    • Springer
    • S. Kounev et al., "Providing dependability and resilience in the cloud: Challenges and opportunities, " in Resilience Assessment and Evaluation of Computing Systems. Springer, 2012, pp. 65-81.
    • (2012) Resilience Assessment and Evaluation of Computing Systems. , pp. 65-81
    • Kounev, S.1
  • 26
    • 85038970528 scopus 로고    scopus 로고
    • Framework and Reference Architecture, ETSI, Sophia Antipolis, France vol. 3, p. V1.
    • Framework and Reference Architecture, ETSI, Sophia Antipolis, France vol. 3, p. V1.
  • 29
    • 85038957356 scopus 로고    scopus 로고
    • GS MEC 003-V1.1.1-Mobile Edge Computing (MEC); Framework and Reference Architecture, E. GS
    • GS MEC 003-V1.1.1-Mobile Edge Computing (MEC); Framework and Reference Architecture, E. GS.
  • 30
    • 85008245198 scopus 로고    scopus 로고
    • Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
    • Jan.
    • R. Roman, J. Lopez, and M. Mambo, "Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges, " Future Generat. Comput. Syst., vol. 78, pp. 680-698, Jan. 2018.
    • (2018) Future Generat. Comput. Syst. , vol.78 , pp. 680-698
    • Roman, R.1    Lopez, J.2    Mambo, M.3
  • 31
    • 85038896082 scopus 로고    scopus 로고
    • Mobile CORD (Central Office Re-Architected as a Datacenter), ONF
    • Mobile CORD (Central Office Re-Architected as a Datacenter), ONF.
  • 36
    • 84951050684 scopus 로고    scopus 로고
    • A survey of fog computing: Concepts, applications and issues
    • S. Yi, C. Li, and Q. Li, "A survey of fog computing: Concepts, applications and issues, " in Proc. Workshop Mobile Big Data, 2015, pp. 37-42.
    • (2015) Proc. Workshop Mobile Big Data , pp. 37-42
    • Yi, S.1    Li, C.2    Li, Q.3
  • 37
    • 85010031130 scopus 로고    scopus 로고
    • Fog and IoT: An overview of research opportunities
    • Dec.
    • M. Chiang and T. Zhang, "Fog and IoT: An overview of research opportunities, " IEEE Internet Things J., vol. 3, no. 6, pp. 854-864, Dec. 2016.
    • (2016) IEEE Internet Things J. , vol.3 , Issue.6 , pp. 854-864
    • Chiang, M.1    Zhang, T.2
  • 41
    • 84897101278 scopus 로고    scopus 로고
    • Security policy verification for multi-domains in cloud systems
    • A. Gouglidis, I. Mavridis, and V. C. Hu, "Security policy verification for multi-domains in cloud systems, " Int. J. Inf. Secur., vol. 13, no. 2, pp. 97-111, 2014.
    • (2014) Int. J. Inf. Secur. , vol.13 , Issue.2 , pp. 97-111
    • Gouglidis, A.1    Mavridis, I.2    Hu, V.C.3
  • 42
    • 84861095268 scopus 로고    scopus 로고
    • DomRBAC: An access control model for modern collaborative systems
    • A. Gouglidis and I. Mavridis, "domRBAC: An access control model for modern collaborative systems, " Comput. Secur., vol. 31, no. 4, pp. 540-556, 2012. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167404812000144
    • (2012) Comput. Secur. , vol.31 , Issue.4 , pp. 540-556
    • Gouglidis, A.1    Mavridis, I.2
  • 43
    • 84941286216 scopus 로고    scopus 로고
    • Policy-driven security management for fog computing: Preliminary framework and a case study
    • Aug.
    • C. Dsouza, G.-J. Ahn, and M. Taguinod, "Policy-driven security management for fog computing: Preliminary framework and a case study, " in Proc. IEEE 15th Int. Conf. Inf. Reuse Integr. (IRI), Aug. 2014, pp. 16-23.
    • (2014) Proc. IEEE 15th Int. Conf. Inf. Reuse Integr. (IRI) , pp. 16-23
    • Dsouza, C.1    Ahn, G.-J.2    Taguinod, M.3
  • 44
    • 3342966061 scopus 로고    scopus 로고
    • The ganglia distributed monitoring system: Design, implementation, and experience
    • M. L. Massie, B. N. Chun, and D. E. Culler, "The ganglia distributed monitoring system: Design, implementation, and experience, " Parallel Comput., vol. 30, no. 7, pp. 817-840, 2004.
    • (2004) Parallel Comput. , vol.30 , Issue.7 , pp. 817-840
    • Massie, M.L.1    Chun, B.N.2    Culler, D.E.3
  • 45
    • 21844451436 scopus 로고    scopus 로고
    • A scalable distributed information management system
    • P. Yalagandula and M. Dahlin, "A scalable distributed information management system, " ACM SIGCOMM Comput. Commun. Rev., vol. 34, no. 4, pp. 379-390, 2004.
    • (2004) ACM SIGCOMM Comput. Commun. Rev. , vol.34 , Issue.4 , pp. 379-390
    • Yalagandula, P.1    Dahlin, M.2
  • 46
    • 84876261476 scopus 로고    scopus 로고
    • Towards highly reliable enterprise network services via inference of multi-level dependencies
    • P. Bahl, R. Chandra, A. Greenberg, S. Kandula, D. A. Maltz, and M. Zhang, "Towards highly reliable enterprise network services via inference of multi-level dependencies, " ACM SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 13-24, 2007.
    • (2007) ACM SIGCOMM Comput. Commun. Rev. , vol.37 , Issue.4 , pp. 13-24
    • Bahl, P.1    Chandra, R.2    Greenberg, A.3    Kandula, S.4    Maltz, D.A.5    Zhang, M.6
  • 51
    • 76749154505 scopus 로고    scopus 로고
    • EbAT: Online methods for detecting utility cloud anomalies
    • Art. no. 4
    • C. Wang, "EbAT: Online methods for detecting utility cloud anomalies, " in Proc. 6th Middleware Doctoral Symp., 2009, Art. no. 4.
    • (2009) Proc. 6th Middleware Doctoral Symp.
    • Wang, C.1
  • 53
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • T. Garfinkel and M. Rosenblum, "A virtual machine introspection based architecture for intrusion detection, " in Proc. NDSS, vol. 3. 2003, pp. 191-206.
    • (2003) Proc. NDSS , vol.3 , pp. 191-206
    • Garfinkel, T.1    Rosenblum, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.