2019
DOI: 10.15439/2019f348
|View full text |Cite
|
Sign up to set email alerts
|

A Fog Computing Architecture for Security and Quality of Service

Abstract: The Fog Computing paradigm is an emerging architecture and focuses on optimizing resources for the Internet of Things environment, bringing to the Edge, Cloud's characteristics. The demand generated by the number of possible devices in this network attracts problems related to quality of service, security, among others, attracting researchers from the most diverse areas. In our work, in addition to performing a study on selected works in a mapping process, detecting trends in the use of Fog architectures. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 27 publications
(34 reference statements)
0
3
0
Order By: Relevance
“…In this section we synthesize the controller for altitude channel . Therefore, the transfer function of Z channel has a form: (31) According to the optimum modulus method [3], [10], we can obtain the transfer function of channel controller in the following form: From the simulation results, we see that all the desired state reached along channel Z, X, Y with fast response. These results prove that the controllers work well with good tracking performance.…”
Section: The Synthesis Of Position Control Systemmentioning
confidence: 99%
“…In this section we synthesize the controller for altitude channel . Therefore, the transfer function of Z channel has a form: (31) According to the optimum modulus method [3], [10], we can obtain the transfer function of channel controller in the following form: From the simulation results, we see that all the desired state reached along channel Z, X, Y with fast response. These results prove that the controllers work well with good tracking performance.…”
Section: The Synthesis Of Position Control Systemmentioning
confidence: 99%
“…The authentication steps must collect biometric of different users then setup a secure channel. In the future, fog computing architecture and cloud computing will require the machine learning approach to manage the users, communication, and data of users [30][31][32].…”
Section: B Challengesmentioning
confidence: 99%
“…Others, on the other hand, due to their specificity, should work quickly and guarantee an instant response to human actions. Some should be available basically non-stop and have a sufficiently developed Continuous Integration/Continuous Delivery (CI/CD) process so that when a new version is deployed on the servers, continuous operation is guaranteed for the user [9].…”
Section: Introductionmentioning
confidence: 99%