메뉴 건너뛰기




Volumn 109, Issue , 2020, Pages 573-582

A novel trust mechanism based on Fog Computing in Sensor–Cloud System

Author keywords

Edge node; Fog Computing; Misjudgment node; Sensor Cloud; Trust mechanism

Indexed keywords

FOG; PETROLEUM RESERVOIR EVALUATION; SENSOR NODES; TRUSTED COMPUTING;

EID: 85049738304     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2018.05.049     Document Type: Article
Times cited : (113)

References (33)
  • 2
    • 78650497196 scopus 로고    scopus 로고
    • Sensor-cloud infrastructure - physical sensor management with virtualized sensors on cloud computing
    • International Conference on Network-Based Information Systems
    • M. Yuriyama, T. Kushida, Sensor-cloud infrastructure - physical sensor management with virtualized sensors on cloud computing, in: International Conference on Network-Based Information Systems, 2010, pp. 1–8.
    • (2010) , pp. 1-8
    • Yuriyama, M.1    Kushida, T.2
  • 4
    • 85027442121 scopus 로고    scopus 로고
    • On theoretical modeling of sensor cloud: a paradigm shift from wireless sensor network
    • Misra, S., Chatterjee, S., Obaidat, M.S., On theoretical modeling of sensor cloud: a paradigm shift from wireless sensor network. IEEE Syst. J. 11:2 (2017), 1084–1093.
    • (2017) IEEE Syst. J. , vol.11 , Issue.2 , pp. 1084-1093
    • Misra, S.1    Chatterjee, S.2    Obaidat, M.S.3
  • 5
    • 84897093175 scopus 로고    scopus 로고
    • Sensor cloud: a cloud of virtual sensors
    • Madria, S., Kumar, V., Dalvi, R., Sensor cloud: a cloud of virtual sensors. IEEE Softw. 31:2 (2014), 70–77.
    • (2014) IEEE Softw. , vol.31 , Issue.2 , pp. 70-77
    • Madria, S.1    Kumar, V.2    Dalvi, R.3
  • 7
    • 85040682831 scopus 로고    scopus 로고
    • Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
    • Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., Tang, Y., Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106 (2018), 117–123.
    • (2018) J. Netw. Comput. Appl. , vol.106 , pp. 117-123
    • Shen, J.1    Gui, Z.2    Ji, S.3    Shen, J.4    Tan, H.5    Tang, Y.6
  • 8
    • 85070851178 scopus 로고    scopus 로고
    • Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
    • Gao, C.Z., Cheng, Q., Li, X., Xia, S.B., Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Cluster Comput., 2018, 1–9.
    • (2018) Cluster Comput. , pp. 1-9
    • Gao, C.Z.1    Cheng, Q.2    Li, X.3    Xia, S.B.4
  • 9
    • 85042177655 scopus 로고    scopus 로고
    • Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures
    • Xu, J., Wei, L., Zhang, Y., Wang, A., Zhou, F., Gao, C.Z., Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl. 107 (2018), 113–124.
    • (2018) J. Netw. Comput. Appl. , vol.107 , pp. 113-124
    • Xu, J.1    Wei, L.2    Zhang, Y.3    Wang, A.4    Zhou, F.5    Gao, C.Z.6
  • 10
    • 85018267100 scopus 로고    scopus 로고
    • Optimization coverage conserving protocol with authentication in wireless sensor networks
    • 155014771769556
    • Sun, Z., Li, L., Li, X., Xing, X., Li, Y., Optimization coverage conserving protocol with authentication in wireless sensor networks. Int. J. Distrib. Sens. Netw., 13(3), 2017 155014771769556.
    • (2017) Int. J. Distrib. Sens. Netw. , vol.13 , Issue.3
    • Sun, Z.1    Li, L.2    Li, X.3    Xing, X.4    Li, Y.5
  • 11
    • 85027927161 scopus 로고    scopus 로고
    • Security in the integration of low-power wireless sensor networks with the internet: a survey
    • Granjal, J., Monteiro, E., Silva, J.S., Security in the integration of low-power wireless sensor networks with the internet: a survey. Ad Hoc Netw. 24 (2015), 264–287.
    • (2015) Ad Hoc Netw. , vol.24 , pp. 264-287
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 12
    • 85041446395 scopus 로고    scopus 로고
    • Data reduction for a smart citys critical infrastructural health monitoring
    • Wang, T., Bhuiyan, M.Z.A., Wang, G., Rahman, M.A., Wu, J., Cao, J., Data reduction for a smart citys critical infrastructural health monitoring. IEEE Commun. Mag. 56:3 (2018), 128–133.
    • (2018) IEEE Commun. Mag. , vol.56 , Issue.3 , pp. 128-133
    • Wang, T.1    Bhuiyan, M.Z.A.2    Wang, G.3    Rahman, M.A.4    Wu, J.5    Cao, J.6
  • 14
    • 84953355723 scopus 로고    scopus 로고
    • A trust aware routing protocol for energy constrained wireless sensor network
    • Ahmed, A., Bakar, K.A., Channa, M.I., Haseeb, K., Khan, A.W., A trust aware routing protocol for energy constrained wireless sensor network. Telecommun. Syst. 61:1 (2016), 123–140.
    • (2016) Telecommun. Syst. , vol.61 , Issue.1 , pp. 123-140
    • Ahmed, A.1    Bakar, K.A.2    Channa, M.I.3    Haseeb, K.4    Khan, A.W.5
  • 15
    • 84891933258 scopus 로고    scopus 로고
    • Management and applications of trust in wireless sensor networks: a survey
    • Han, G., Jiang, J., Shu, L., Niu, J., Chao, H.C., Management and applications of trust in wireless sensor networks: a survey. J. Comput. System Sci. 80:3 (2014), 602–617.
    • (2014) J. Comput. System Sci. , vol.80 , Issue.3 , pp. 602-617
    • Han, G.1    Jiang, J.2    Shu, L.3    Niu, J.4    Chao, H.C.5
  • 16
    • 84927602818 scopus 로고    scopus 로고
    • An efficient distributed trust model for wireless sensor networks
    • Jiang, J., Han, G., Wang, F., Shu, L., An efficient distributed trust model for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26:5 (2015), 1228–1237.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.5 , pp. 1228-1237
    • Jiang, J.1    Han, G.2    Wang, F.3    Shu, L.4
  • 17
    • 85088614279 scopus 로고    scopus 로고
    • Comprehensive trustworthy data collection approach in sensor-cloud system
    • IEEE Transactions on Big Data
    • Wang, T., Li, Y., Fang, W., Xu, W., Liang, J., Chen, Y., Liu, X., Comprehensive trustworthy data collection approach in sensor-cloud system. 2018, IEEE Transactions on Big Data.
    • (2018)
    • Wang, T.1    Li, Y.2    Fang, W.3    Xu, W.4    Liang, J.5    Chen, Y.6    Liu, X.7
  • 19
    • 84957690302 scopus 로고    scopus 로고
    • Improved TOPSIS method based trust evaluation framework for determining trustworthiness of cloud service providers
    • Sidhu, J., Singh, S., Improved TOPSIS method based trust evaluation framework for determining trustworthiness of cloud service providers. J. Grid Comput. 15:1 (2016), 1–25.
    • (2016) J. Grid Comput. , vol.15 , Issue.1 , pp. 1-25
    • Sidhu, J.1    Singh, S.2
  • 20
    • 84942064617 scopus 로고    scopus 로고
    • Hybrid model for dynamic evaluation of trust in cloud services
    • Rajendran, V.V., Swamynathan, S., Hybrid model for dynamic evaluation of trust in cloud services. Wirel. Netw. 22:6 (2016), 1–12.
    • (2016) Wirel. Netw. , vol.22 , Issue.6 , pp. 1-12
    • Rajendran, V.V.1    Swamynathan, S.2
  • 21
    • 84925450955 scopus 로고    scopus 로고
    • Flavio Milito, Fog computing: a platform for internet of things and analytics
    • Big data and internet of things: A roadmap for smart environments
    • R.N.P.Z.J. Bonomi, Flavio Milito, Fog computing: a platform for internet of things and analytics, in: Big data and internet of things: A roadmap for smart environments, 2014, pp. 169–186.
    • (2014) , pp. 169-186
    • Bonomi, R.N.P.Z.J.1
  • 22
    • 84975797315 scopus 로고    scopus 로고
    • A sensor cloud architecture for healthcare applications
    • ACM Symposium on Applied Computing
    • M.J. Guezguez, S. Rekhis, N. Boudriga, A sensor cloud architecture for healthcare applications, in: ACM Symposium on Applied Computing, 2016, pp. 612–617.
    • (2016) , pp. 612-617
    • Guezguez, M.J.1    Rekhis, S.2    Boudriga, N.3
  • 23
    • 85012050732 scopus 로고    scopus 로고
    • Sensing-cloud: leveraging the benefits for agricultural applications
    • Ojha, T., Misra, S., Raghuwanshi, N.S., Sensing-cloud: leveraging the benefits for agricultural applications. Comput. Electron. Agric. 135 (2017), 96–107.
    • (2017) Comput. Electron. Agric. , vol.135 , pp. 96-107
    • Ojha, T.1    Misra, S.2    Raghuwanshi, N.S.3
  • 24
    • 84883262576 scopus 로고    scopus 로고
    • Trust management in cloud-integrated wireless sensor networks
    • International Conference on Collaboration Technologies and Systems
    • O. Savas, G. Jin, J. Deng, Trust management in cloud-integrated wireless sensor networks, in: International Conference on Collaboration Technologies and Systems, 2013, pp. 334–341.
    • (2013) , pp. 334-341
    • Savas, O.1    Jin, G.2    Deng, J.3
  • 25
    • 84919816091 scopus 로고    scopus 로고
    • An authenticated trust and reputation calculation and management system for cloud and sensor networks integration
    • Zhu, C., Nicanfar, H., Leung, V.C.M., Yang, L.T., An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans. Inf. Forensics Secur. 10:1 (2014), 118–131.
    • (2014) IEEE Trans. Inf. Forensics Secur. , vol.10 , Issue.1 , pp. 118-131
    • Zhu, C.1    Nicanfar, H.2    Leung, V.C.M.3    Yang, L.T.4
  • 27
    • 84930362469 scopus 로고    scopus 로고
    • A trust point-based security architecture for sensor data in the cloud
    • Henze, M., Hummen, R., Matzutt, R., Wehrle, K., A trust point-based security architecture for sensor data in the cloud. Trusted Cloud Comput., 2014, 77–106.
    • (2014) Trusted Cloud Comput. , pp. 77-106
    • Henze, M.1    Hummen, R.2    Matzutt, R.3    Wehrle, K.4
  • 28
    • 84862138560 scopus 로고    scopus 로고
    • Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
    • Bao, F., Chen, I.R., Chang, M.J., Cho, J.H., Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9:2 (2012), 169–183.
    • (2012) IEEE Trans. Netw. Serv. Manag. , vol.9 , Issue.2 , pp. 169-183
    • Bao, F.1    Chen, I.R.2    Chang, M.J.3    Cho, J.H.4
  • 29
    • 85010748896 scopus 로고    scopus 로고
    • Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks
    • Prabha, V.R., Latha, P., Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks. Sdhan 42:2 (2017), 1–9.
    • (2017) Sdhan , vol.42 , Issue.2 , pp. 1-9
    • Prabha, V.R.1    Latha, P.2
  • 31
    • 84866627419 scopus 로고    scopus 로고
    • Fog computing and its role in the internet of things
    • Edition of the Mcc Workshop on Mobile Cloud Computing
    • F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the internet of things, in: Edition of the Mcc Workshop on Mobile Cloud Computing, 2012, pp. 13–16.
    • (2012) , pp. 13-16
    • Bonomi, F.1    Milito, R.2    Zhu, J.3    Addepalli, S.4
  • 32
    • 84996757871 scopus 로고    scopus 로고
    • Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
    • ACM
    • Rodero-Merino, L., Rodero-Merino, L., Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing. 2014, ACM, 27–32.
    • (2014) , pp. 27-32
    • Rodero-Merino, L.1    Rodero-Merino, L.2
  • 33
    • 84857860482 scopus 로고    scopus 로고
    • A ladder diffusion algorithm using ant colony optimization for wireless sensor networks
    • Ho, J.H., Shih, H.C., Liao, B.Y., Chu, S.C., A ladder diffusion algorithm using ant colony optimization for wireless sensor networks. Inform. Sci. 192:6 (2012), 204–212.
    • (2012) Inform. Sci. , vol.192 , Issue.6 , pp. 204-212
    • Ho, J.H.1    Shih, H.C.2    Liao, B.Y.3    Chu, S.C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.