메뉴 건너뛰기




Volumn 56, Issue 5, 2018, Pages 60-65

Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing

Author keywords

[No Author keywords available]

Indexed keywords

DATA HANDLING;

EID: 85046170692     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCOM.2018.1700795     Document Type: Article
Times cited : (201)

References (15)
  • 1
    • 85026636505 scopus 로고    scopus 로고
    • From cloud to fog computing: A review and a Conceptual Live VM Migration Framework
    • O. Osanaiye et al., "From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework, " IEEE Access, vol. 5, no. 1. 2017, pp. 8284-8300.
    • (2017) IEEE Access , vol.5 , Issue.1 , pp. 8284-8300
    • Osanaiye, O.1
  • 2
    • 84983271749 scopus 로고    scopus 로고
    • A hierarchical edge cloud architecture for mobile Computing
    • L. Tong, Y. Li, and W. Gao, "A Hierarchical Edge Cloud Architecture for Mobile Computing, " Proc. IEEE INFOCOM 2016, 2016, pp. 1-9.
    • (2016) Proc IEEE INFOCOM , vol.2016 , pp. 1-9
    • Tong, L.1    Li, Y.2    Gao, W.3
  • 5
    • 79955722450 scopus 로고    scopus 로고
    • A guide to dynamic load balancing in distributed Computer Systems
    • A. Alakeel, "A Guide to Dynamic Load Balancing in Distributed Computer Systems, " Intl. J. Computer Science Info. Security, vol. 10, no. 6, 2010, pp. 153-60.
    • (2010) Intl. J. Computer Science Info. Security , vol.10 , Issue.6 , pp. 153-160
    • Alakeel, A.1
  • 6
    • 85029605430 scopus 로고    scopus 로고
    • A foggy research future: Advances and future Opportunities in Fog Computing Research
    • K-K R. Choo et al., "A Foggy Research Future: Advances and Future Opportunities in Fog Computing Research, " Future Generation Computer Systems, vol. 78, no. 2, 2018, pp. 677-79.
    • (2018) Future Generation Computer Systems , vol.78 , Issue.2 , pp. 677-679
    • Choo, K.-K.R.1
  • 7
    • 84983260423 scopus 로고    scopus 로고
    • Cloudlet load balancing in wireless metropolitan Area Networks
    • M. Jia et al., "Cloudlet Load Balancing in Wireless Metropolitan Area Networks, " Proc. IEEE INFOCOM 2016, 2016, pp. 1-9.
    • (2016) Proc IEEE INFOCOM , vol.2016 , pp. 1-9
    • Jia, M.1
  • 8
    • 0027663155 scopus 로고
    • Strategies for dynamic load balancing on highly Parallel Computers
    • M. Willebeek-LeMair and A. Reeves, "Strategies for Dynamic Load Balancing on Highly Parallel Computers, " IEEE Trans. Parallel Distrib. Systems, vol. 4, no. 9, 1993, pp. 979-93.
    • (1993) IEEE Trans. Parallel Distrib. Systems , vol.4 , Issue.9 , pp. 979-993
    • Willebeek-Lemair, M.1    Reeves, A.2
  • 9
    • 85021453463 scopus 로고    scopus 로고
    • Joint bidding and geographical load balancing for Data centers: Is Uncertainty a Blessing or a Curse?
    • Y. Zhang et al., "Joint Bidding and Geographical Load Balancing for Data centers: Is Uncertainty a Blessing or a Curse?" Proc. IEEE INFOCOM 2017, 2017, pp. 1-9.
    • (2017) Proc IEEE INFOCOM , vol.2017 , pp. 1-9
    • Zhang, Y.1
  • 10
    • 84978224275 scopus 로고    scopus 로고
    • Threats to networking cloud and edge data Centers in the Internet of Things
    • D. Puthal et al., "Threats to Networking Cloud and Edge Data Centers in the Internet of Things, " IEEE Cloud Computing, vol. 3, no. 3, 2016, pp. 64-71.
    • (2016) IEEE Cloud Computing , vol.3 , Issue.3 , pp. 64-71
    • Puthal, D.1
  • 11
    • 84964260924 scopus 로고    scopus 로고
    • Cloud-centric multi-level authentication as a Service for Secure Public Safety Device Networks
    • Apr
    • I. Butun et al., "Cloud-Centric Multi-Level Authentication as a Service for Secure Public Safety Device Networks, " IEEE Commun. Mag., vol. 54, no. 4, Apr. 2016, pp. 47-53.
    • (2016) IEEE Commun. Mag , vol.54 , Issue.4 , pp. 47-53
    • Butun, I.1
  • 12
    • 84921481484 scopus 로고    scopus 로고
    • Authentication protocol for an ambient assisted Living System
    • Jan
    • D. He and S. Zeadally, "Authentication Protocol for an Ambient Assisted Living System, " IEEE Commun. Mag., vol. 53, no. 1, Jan. 2015, pp. 71-77.
    • (2015) IEEE Commun. Mag , vol.53 , Issue.1 , pp. 71-77
    • He, D.1    Zeadally, S.2
  • 13
    • 85108192267 scopus 로고    scopus 로고
    • A synchronized shared key generation method for Maintaining End-To-End Security of Big Data Streams
    • D. Puthal et al., "A Synchronized Shared Key Generation Method for Maintaining End-To-End Security of Big Data Streams, " Proc. 50th Hawaii Intl. Conf. System Sciences, 2017, pp. 6011-20.
    • (2017) Proc. 50th Hawaii Intl. Conf. System Sciences , pp. 6011-6020
    • Puthal, D.1
  • 14
    • 85031103873 scopus 로고    scopus 로고
    • Building security perimeters to protect network Systems against Cyber Threats
    • D. Puthal et al., "Building Security Perimeters to Protect Network Systems against Cyber Threats, " IEEE Consumer Electronics Mag., vol. 6, no. 4, 2017, pp. 71-77.
    • (2017) IEEE Consumer Electronics Mag , vol.6 , Issue.4 , pp. 71-77
    • Puthal, D.1
  • 15
    • 85008884270 scopus 로고    scopus 로고
    • Dlsef: A dynamic key-length-based efficient Real-Time Security Verification Model for Big Data Stream
    • D. Puthal et al., "DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream, " ACM Trans/Embedded Computing Systems, vol. 16, no. 2, 2017, pp. 51:1-24.
    • (2017) ACM Trans/Embedded Computing Systems , vol.16 , Issue.2 , pp. 511-524
    • Puthal, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.