logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Security And Privacy Challenges For Internetofthings And Fog Computing Ximeng Liu

  • SKU: BELL-50194936
Security And Privacy Challenges For Internetofthings And Fog Computing Ximeng Liu
$ 31.00 $ 45.00 (-31%)

5.0

78 reviews

Security And Privacy Challenges For Internetofthings And Fog Computing Ximeng Liu instant download after payment.

Publisher: Hindawi
File Extension: PDF
File size: 35.65 MB
Pages: 214
Author: Ximeng Liu, Yang Yang, Raymond Kim‑Kwang Choo, Huaqun Wang
Language: English
Year: 2018

Product desciption

Security And Privacy Challenges For Internetofthings And Fog Computing Ximeng Liu by Ximeng Liu, Yang Yang, Raymond Kim‑kwang Choo, Huaqun Wang instant download after payment.

Internet-of-things(IoT) has been considered as a necessary part of our daily life with billions of IoT devices collecting data through wireless technology and can interoperate within the existing Internet infrastructure. The new fog computing paradigm allows storing and processing data at the network edge or anywhere along the cloud-to-endpoint continuum, and it also overcomes the limitations of IoT devices and allows us to design a far more capable architecture. Unfortunately, this new IoT-Fog paradigm faces many new security and privacy issues, such as secure communication, authentication and authorization, and information confidentiality.
Although the traditional cloud-based platform can even use heavyweight cryptosystem to enhance the security, it
cannot be performed on the resource-constrained fog devices directly. Moreover, millions of smart fog devices are wildly distributed and located in different areas, which increases the risk of being compromised by some malicious parties. 
To address these arising challenges and opportunitiesdifferent from traditional cloud-based architecture, all the papers chosen for this special issue represent recent progress in the field of security and privacy techniques relevant to the convergence of IoT with fog computing, including identity/attribute-based cryptography, system and soſtware security, system and resource optimization, user privacy preservation, and data protection. Overall, our international editorial committee selected 17 papers among 70 submissions from both the theoretical and the practical side. All of these papers in this special issue not only provide novel ideas and state-of-the-art techniques in the field of IoT-Fog computing but also stimulate future research in the IoT-Fog computing environment.

Related Products