Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (44)
  • Open Access

    ARTICLE

    Securing Fog Computing For E-Learning System Using Integration of Two Encryption Algorithms

    Hind A. Alshambri1,* Fawaz Alassery2

    Journal of Cyber Security, Vol.3, No.3, pp. 149-166, 2021, DOI:10.32604/jcs.2021.022112

    Abstract Currently, the majority of institutions have made use of information technologies to improve and develop their diverse educational methods to attract more learners. Through information technologies, e-learning and learning-on-the go have been adopted by the institutions to provide affordability and flexibility of educational services. Most of the educational institutes are offering online teaching classes using the technologies like cloud computing, networking, etc. Educational institutes have developed their e-learning platforms for the online learning process, through this way they have paved the way for distance learning. But e-learning platform has to face a lot of security challenges in terms of cyberattacks… More >

  • Open Access

    ARTICLE

    Mobile Fog Computing by Using SDN/NFV on 5G Edge Nodes

    G. R. Sreekanth1,*, S. Ahmed Najat Ahmed2, Marko Sarac3, Ivana Strumberger3, Nebojsa Bacanin3, Miodrag Zivkovic3

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 751-765, 2022, DOI:10.32604/csse.2022.020534

    Abstract Fog computing provides quality of service for cloud infrastructure. As the data computation intensifies, edge computing becomes difficult. Therefore, mobile fog computing is used for reducing traffic and the time for data computation in the network. In previous studies, software-defined networking (SDN) and network functions virtualization (NFV) were used separately in edge computing. Current industrial and academic research is tackling to integrate SDN and NFV in different environments to address the challenges in performance, reliability, and scalability. SDN/NFV is still in development. The traditional Internet of things (IoT) data analysis system is only based on a linear and time-variant system… More >

  • Open Access

    ARTICLE

    Quantum Firefly Secure Routing for Fog Based Wireless Sensor Networks

    R. Dayana1,*, G. Maria Kalavathy2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1511-1528, 2022, DOI:10.32604/iasc.2022.020551

    Abstract Wireless Sensor Networks (WSNs) become an integral part of Internet of Things (IoT) and finds their applicability in several domains. As classical WSN faces several issues in service-based IoT applications, fog computing has been introduced in real-time, enabling local data processing and avoid raw data transmission to cloud servers. The Fog-based WSN generally involves advanced nodes, normal nodes, and some Fog Nodes (FN). Though the Fog-based WSN offers several benefits, there is a need to develop an effective trust-based secure routing protocol for data transmission among Cluster Heads (CHs) and FNs. In this view, this paper presents a Quantum Firefly… More >

  • Open Access

    ARTICLE

    Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography

    N. Niyaz Ahamed*, N. Duraipandian

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 83-94, 2022, DOI:10.32604/csse.2022.020071

    Abstract The tremendous development of cloud computing with related technologies is an unexpected one. However, centralized cloud storage faces few challenges such as latency, storage, and packet drop in the network. Cloud storage gets more attention due to its huge data storage and ensures the security of secret information. Most of the developments in cloud storage have been positive except better cost model and effectiveness, but still data leakage in security are billion-dollar questions to consumers. Traditional data security techniques are usually based on cryptographic methods, but these approaches may not be able to withstand an attack from the cloud server's… More >

  • Open Access

    ARTICLE

    Efficient Resource Allocation in Fog Computing Using QTCS Model

    M. Iyapparaja1, Naif Khalaf Alshammari2,*, M. Sathish Kumar1, S. Siva Rama Krishnan1, Chiranji Lal Chowdhary1

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2225-2239, 2022, DOI:10.32604/cmc.2022.015707

    Abstract Infrastructure of fog is a complex system due to the large number of heterogeneous resources that need to be shared. The embedded devices deployed with the Internet of Things (IoT) technology have increased since the past few years, and these devices generate huge amount of data. The devices in IoT can be remotely connected and might be placed in different locations which add to the network delay. Real time applications require high bandwidth with reduced latency to ensure Quality of Service (QoS). To achieve this, fog computing plays a vital role in processing the request locally with the nearest available… More >

  • Open Access

    ARTICLE

    FogQSYM: An Industry 4.0 Analytical Model for Fog Applications

    M. Iyapparaja1, M. Sathish Kumar1, S. Siva Rama Krishnan1, Chiranji Lal Chowdhary1, Byungun Yoon2, Saurabh Singh2, Gi Hwan Cho3,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3163-3178, 2021, DOI:10.32604/cmc.2021.017302

    Abstract Industry 4.0 refers to the fourth evolution of technology development, which strives to connect people to various industries in terms of achieving their expected outcomes efficiently. However, resource management in an Industry 4.0 network is very complex and challenging. To manage and provide suitable resources to each service, we propose a FogQSYM (Fog–-Queuing system) model; it is an analytical model for Fog Applications that helps divide the application into several layers, then enables the sharing of the resources in an effective way according to the availability of memory, bandwidth, and network services. It follows the Markovian queuing model that helps… More >

  • Open Access

    ARTICLE

    Resource Management and Task Offloading Issues in the Edge–Cloud Environment

    Jaber Almutairi1, Mohammad Aldossary2,*

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 129-145, 2021, DOI:10.32604/iasc.2021.018480

    Abstract With the increasing number of Internet of Things (IoT) devices connected to the internet, a platform is required to support the enormous amount of data they generate. Since cloud computing is far away from the connected IoT devices, applications that require low-latency, real-time interaction and high quality of service (QoS) may suffer network delay in using the Cloud. Consequently, the concept of edge computing has appeared to complement cloud services, working as an intermediate layer with computation capabilities between the Cloud and IoT devices, to overcome these limitations. Although edge computing is a promising enabler for issues related to latency… More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning Intrusion Detection Model for Fog Computing Environment

    K. Kalaivani*, M. Chinnadurai

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 1-15, 2021, DOI:10.32604/iasc.2021.017515

    Abstract Fog computing extends the concept of cloud computing by providing the services of computing, storage, and networking connectivity at the edge between data centers in cloud computing environments and end devices. Having the intelligence at the edge enables faster real-time decision-making and reduces the amount of data forwarded to the cloud. When enhanced by fog computing, the Internet of Things (IoT) brings low latency and improves real time and quality of service (QoS) in IoT applications of augmented reality, smart grids, smart vehicles, and healthcare. However, both cloud and fog computing environments are vulnerable to several kinds of attacks that… More >

  • Open Access

    ARTICLE

    Detecting Man-in-the-Middle Attack in Fog Computing for Social Media

    Farouq Aliyu1,*, Tarek Sheltami1, Ashraf Mahmoud1, Louai Al-Awami1, Ansar Yasar2

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1159-1181, 2021, DOI:10.32604/cmc.2021.016938

    Abstract Fog computing (FC) is a networking paradigm where wireless devices known as fog nodes are placed at the edge of the network (close to the Internet of Things (IoT) devices). Fog nodes provide services in lieu of the cloud. Thus, improving the performance of the network and making it attractive to social media-based systems. Security issues are one of the most challenges encountered in FC. In this paper, we propose an anomaly-based Intrusion Detection and Prevention System (IDPS) against Man-in-the-Middle (MITM) attack in the fog layer. The system uses special nodes known as Intrusion Detection System (IDS) nodes to detect… More >

  • Open Access

    ARTICLE

    An Efficient Impersonation Attack Detection Method in Fog Computing

    Jialin Wan1, Muhammad Waqas1,2, Shanshan Tu1,*, Syed Mudassir Hussain3, Ahsan Shah2, Sadaqat Ur Rehman4, Muhammad Hanif2

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 267-281, 2021, DOI:10.32604/cmc.2021.016260

    Abstract Fog computing paradigm extends computing, communication, storage, and network resources to the network’s edge. As the fog layer is located between cloud and end-users, it can provide more convenience and timely services to end-users. However, in fog computing (FC), attackers can behave as real fog nodes or end-users to provide malicious services in the network. The attacker acts as an impersonator to impersonate other legitimate users. Therefore, in this work, we present a detection technique to secure the FC environment. First, we model a physical layer key generation based on wireless channel characteristics. To generate the secret keys between the… More >

Displaying 31-40 on page 4 of 44. Per Page