메뉴 건너뛰기




Volumn 55, Issue 11, 2017, Pages 114-122

Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges

Author keywords

[No Author keywords available]

Indexed keywords

5G MOBILE COMMUNICATION SYSTEMS; CLOUD COMPUTING; DATA HANDLING; DIGITAL STORAGE; DISTRIBUTED COMPUTER SYSTEMS; FOG; NETWORK ARCHITECTURE; NETWORK SECURITY; SATELLITE COMMUNICATION SYSTEMS;

EID: 85040563521     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCOM.2017.1700102     Document Type: Article
Times cited : (119)

References (15)
  • 2
    • 85029514408 scopus 로고    scopus 로고
    • Data offloading in 5g-enabled soft-ware-defined vehicular networks: A stackelberg game-based approach
    • July
    • G. S. Aujla et al, "Data Offloading in 5G-Enabled Soft-ware-Defined Vehicular Networks: A Stackelberg Game-Based Approach, " IEEE Commun. Mag., vol. 55, no. 7, July 2017.
    • (2017) IEEE Commun. Mag. , vol.55 , Issue.7
    • Aujla, G.S.1
  • 4
    • 84947794275 scopus 로고    scopus 로고
    • Energy-efficient resource assignment and power allocation in heterogeneous cloud radio access networks
    • Nov.
    • M. Peng et al, "Energy-Efficient Resource Assignment and Power Allocation in Heterogeneous Cloud Radio Access Networks, " IEEE Trans. Vehic. Tech., vol. 64, no. 11, Nov. 2015, pp. 5275-87.
    • (2015) IEEE Trans. Vehic. Tech. , vol.64 , Issue.11 , pp. 5275-5287
    • Peng, M.1
  • 5
    • 84976486881 scopus 로고    scopus 로고
    • Cloud-trust-a security assessment model for infrastructure as a service (iaas) clouds
    • D. Gonzales et al, "Cloud-trust-A Security Assessment Model for Infrastructure as a Service (Iaas) Clouds, " IEEE Trans. Cloud Computing, vol. PP, no. 99, 2015, pp. 1-1.
    • (2015) IEEE Trans. Cloud Computing , vol.PP , Issue.99 , pp. 1
    • Gonzales, D.1
  • 8
    • 84929323807 scopus 로고    scopus 로고
    • Credit-based runtime placement of virtual machines on a single numa system for qos of data access performance
    • June
    • C. Kim and K. H. Park, "Credit-Based Runtime Placement of Virtual Machines on a Single Numa System for QoS of Data Access Performance, " IEEE Trans. Computers, vol. 64, no. 6, June 2015, pp. 1633-46.
    • (2015) IEEE Trans. Computers , vol.64 , Issue.6 , pp. 1633-1646
    • Kim, C.1    Park, K.H.2
  • 9
    • 84979609826 scopus 로고    scopus 로고
    • Fog-computing based radio access networks: Issues and challenges
    • July
    • M. Peng et al, "Fog-Computing Based Radio Access Networks: Issues and Challenges, " IEEE Network, vol. 30, no. 4, July 2016, pp. 46-53.
    • (2016) IEEE Network , vol.30 , Issue.4 , pp. 46-53
    • Peng, M.1
  • 10
    • 85016254273 scopus 로고    scopus 로고
    • Privacy protection and intrusion avoidance for cloudletbased medical data sharing
    • M. Chen et al, "Privacy Protection and Intrusion Avoidance for Cloudletbased Medical Data Sharing, " IEEE Trans. Cloud Computing, vol. PP, no. 99, 2016, pp. 1-1.
    • (2016) IEEE Trans. Cloud Computing , vol.PP , Issue.99 , pp. 1
    • Chen, M.1
  • 11
    • 84966662927 scopus 로고    scopus 로고
    • Assessment of the suitability of fog computing in the context of internet of things
    • S. Sarkar, S. Chatterjee, and S. Misra, "Assessment of the Suitability of Fog Computing in the Context of Internet of Things, " IEEE Trans. Cloud Computing, vol. PP, no. 99, 201, pp. 1-15.
    • IEEE Trans. Cloud Computing , vol.201 PP , Issue.99 , pp. 1-15
    • Sarkar, S.1    Chatterjee, S.2    Misra, S.3
  • 12
    • 84886723209 scopus 로고    scopus 로고
    • A survey on security issues and solutions at diferent layers of cloud computing
    • C. Modi et al, "A Survey on Security Issues and Solutions at Diferent Layers of Cloud Computing, " J. Supercomputing, vol. 63, no. 2, 2013, pp. 561-92.
    • (2013) J. Supercomputing , vol.63 , Issue.2 , pp. 561-592
    • Modi, C.1
  • 14
    • 84979088428 scopus 로고    scopus 로고
    • Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures
    • Sept.
    • D. He et al, "Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures, " IEEE Trans. Info. Forensics and Security, vol. 11, no. 9, Sept. 2016, pp. 2052-64.
    • (2016) IEEE Trans. Info. Forensics and Security , vol.11 , Issue.9 , pp. 2052-2064
    • He, D.1
  • 15
    • 79961218736 scopus 로고    scopus 로고
    • Notice of violation of ieee publication principles peformance analysis of data encryption algo-rithms
    • Apr.
    • O. P. Verma et al, "Notice of Violation of IEEE Publication Principles Peformance Analysis of Data Encryption Algo-rithms, " 2011 3rd Int'l. Conf. Electronics Computer Technology, vol. 5, Apr. 2011, pp. 399-403.
    • (2011) 2011 3rd int'L. Conf. Electronics Computer Technology , vol.5 , pp. 399-403
    • Verma, O.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.