2017 4th International Conference on Electronics and Communication Systems (ICECS) 2017
DOI: 10.1109/ecs.2017.8067851
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive overview on secure offloading in mobile cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…Security issues of mobile IoT offloading have been discussed extensively in recent works [34], [35], [36]. Specially, access control, an efficient security mechanism, can ensure the high security capacity of offloading systems and preserve computation resources by offering numerous features such as enhanced device authentication, user authentication as well as improved data privacy and network security [37], [38], [39], [40].…”
Section: A Why Do We Need Blockchain Based Access Control For Mobile ...mentioning
confidence: 99%
“…Security issues of mobile IoT offloading have been discussed extensively in recent works [34], [35], [36]. Specially, access control, an efficient security mechanism, can ensure the high security capacity of offloading systems and preserve computation resources by offering numerous features such as enhanced device authentication, user authentication as well as improved data privacy and network security [37], [38], [39], [40].…”
Section: A Why Do We Need Blockchain Based Access Control For Mobile ...mentioning
confidence: 99%
“…It is consisting of 2 sub-models as follow: Community Trust Extractor (CTE), to extract factors from social networks such as social distance or number of common neighbours, and Community Trust Inference (CTI), to infer the social trust between 2 users in the social networks, such as Google and FB. Similarly, the work in [13], listed some techniques that can be implemented to secure data before sharing it with cloud/edge servers. These are steganography, trusted computing techniques, hardware-based secure execution and homomorphic encryption.…”
Section: Litrature Review Of Edge Computing Solutionsmentioning
confidence: 99%