Architecture and Security Issues in Fog Computing Applications

Architecture and Security Issues in Fog Computing Applications
Author: Goundar, Sam,Bhushan, S. Bharath,Rayani, Praveen Kumar
Publsiher: IGI Global
Total Pages: 205
Release: 2019-09-20
Genre: Computers
ISBN: 9781799801962

Download Architecture and Security Issues in Fog Computing Applications Book in PDF, Epub and Kindle

As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems.

Fog Edge Computing For Security Privacy and Applications

Fog Edge Computing For Security  Privacy  and Applications
Author: Wei Chang,Jie Wu
Publsiher: Springer Nature
Total Pages: 417
Release: 2021-01-04
Genre: Computers
ISBN: 9783030573287

Download Fog Edge Computing For Security Privacy and Applications Book in PDF, Epub and Kindle

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

ICCCE 2018

ICCCE 2018
Author: Amit Kumar,Stefan Mozar
Publsiher: Springer
Total Pages: 801
Release: 2018-08-31
Genre: Technology & Engineering
ISBN: 9789811302121

Download ICCCE 2018 Book in PDF, Epub and Kindle

This book comprises selected articles from the International Communications Conference (ICC) 2018 held in Hyderabad, India in 2018. It offers in-depth information on the latest developments in voice-, data-, image- and multimedia processing research and applications, and includes contributions from both academia and industry.

Secure Edge Computing

Secure Edge Computing
Author: Mohiuddin Ahmed,Paul Haskell-Dowland
Publsiher: CRC Press
Total Pages: 364
Release: 2021-08-13
Genre: Computers
ISBN: 9781000427325

Download Secure Edge Computing Book in PDF, Epub and Kindle

The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. This increased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system’s vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when they are most needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of the network. In this context, this book addresses the cyber security challenges associated with edge computing, which provides a bigger picture of the concepts, techniques, applications, and open research directions in this area. In addition, the book serves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.

Fog Edge and Pervasive Computing in Intelligent IoT Driven Applications

Fog  Edge  and Pervasive Computing in Intelligent IoT Driven Applications
Author: Deepak Gupta,Aditya Khamparia
Publsiher: John Wiley & Sons
Total Pages: 464
Release: 2021-01-07
Genre: Technology & Engineering
ISBN: 9781119670070

Download Fog Edge and Pervasive Computing in Intelligent IoT Driven Applications Book in PDF, Epub and Kindle

A practical guide to the design, implementation, evaluation, and deployment of emerging technologies for intelligent IoT applications With the rapid development in artificially intelligent and hybrid technologies, IoT, edge, fog-driven, and pervasive computing techniques are becoming important parts of our daily lives. This book focuses on recent advances, roles, and benefits of these technologies, describing the latest intelligent systems from a practical point of view. Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications is also valuable for engineers and professionals trying to solve practical, economic, or technical problems. With a uniquely practical approach spanning multiple fields of interest, contributors cover theory, applications, and design methodologies for intelligent systems. These technologies are rapidly transforming engineering, industry, and agriculture by enabling real-time processing of data via computational, resource-oriented metaheuristics and machine learning algorithms. As edge/fog computing and associated technologies are implemented far and wide, we are now able to solve previously intractable problems. With chapters contributed by experts in the field, this book: Describes Machine Learning frameworks and algorithms for edge, fog, and pervasive computing Considers probabilistic storage systems and proven optimization techniques for intelligent IoT Covers 5G edge network slicing and virtual network systems that utilize new networking capacity Explores resource provisioning and bandwidth allocation for edge, fog, and pervasive mobile applications Presents emerging applications of intelligent IoT, including smart farming, factory automation, marketing automation, medical diagnosis, and more Researchers, graduate students, and practitioners working in the intelligent systems domain will appreciate this book’s practical orientation and comprehensive coverage. Intelligent IoT is revolutionizing every industry and field today, and Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications provides the background, orientation, and inspiration needed to begin.

Privacy Enhancing Fog Computing and Its Applications

Privacy Enhancing Fog Computing and Its Applications
Author: Xiaodong Lin,Jianbing Ni,Xuemin (Sherman) Shen
Publsiher: Springer
Total Pages: 89
Release: 2018-11-12
Genre: Computers
ISBN: 9783030021139

Download Privacy Enhancing Fog Computing and Its Applications Book in PDF, Epub and Kindle

This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.

Fog Computing

Fog Computing
Author: Ravi Tomar,Avita Katal,Susheela Dahiya,Niharika Singh,Tanupriya Choudhury
Publsiher: CRC Press
Total Pages: 234
Release: 2022-07-11
Genre: Computers
ISBN: 9781000613032

Download Fog Computing Book in PDF, Epub and Kindle

Fog Computing: Concepts, Frameworks, and Applications is arranged in such a way that readers with no prior experience in Fog Computing may explore this domain. It is an accessible source of information for distributed computing researchers as well as professionals looking to improve their security and connectivity understanding in Internet of Things (IoT) devices. This book is also useful for researchers and professionals working in the field of wireless communication security and privacy research. This book is intended for students, professionals, researchers, and developers who are working in or interested in the field of Fog Computing. One of the book's distinguishing aspects is that it covers a variety of case studies and future possibilities in the field of Fog Computing. This book: Begins by covering the fundamental notions of Fog Computing to help readers grasp the technology, starting from the basics Explains Fog Computing architecture as well as the convergence of Fog, IoT, and Cloud Computing Provides an assessment of Fog Computing and its applications in the field of IoT Discusses the usage of software defined networking and machine learning algorithms as they apply to Fog Computing Describes the different security and privacy issues with Fog Computing and explores single point control systems for consumer devices using Edge-Fog Computing Outlines in detail how to leverage Blockchain technology in Fog Computing, as well as how to use Fog Computing in telemedicine and healthcare applications Examines the usage of communication protocols, simulation tools for Fog Computing implementation, and case studies in the fields of bioinformatics, disaster control, and IoT

Security Issues in Fog Computing from 5G to 6G

Security Issues in Fog Computing from 5G to 6G
Author: Chintan Bhatt,Yulei Wu,Saad Harous,Massimo Villari
Publsiher: Springer Nature
Total Pages: 173
Release: 2022-09-08
Genre: Technology & Engineering
ISBN: 9783031082542

Download Security Issues in Fog Computing from 5G to 6G Book in PDF, Epub and Kindle

The book provides an examination of how fog security is changing the information technology industry and will continue to in the next decade. The authors first discuss how fog enables key applications in wireless 5G, the Internet of Things, and big data. The book then presents an overview of fog/edge computing, focusing on its relationship with cloud technology, Internet of Things and the future with the use of secure 5G/6G communication. The book also presents a comprehensive overview of liabilities in fog/edge computing within multi-level architectures and the intelligent management. The last part of the book reviews applications of fog/edge computing in smart cities, including in Industrial IoT, edge-based augmented reality, data streaming, and blockchain-based.