Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 2017
DOI: 10.1109/dasc-picom-datacom-cyberscitec.2017.90
|View full text |Cite
|
Sign up to set email alerts
|

A Hierarchic Secure Cloud Storage Scheme Based on Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…In the medical imaging system, accessing time is reduced by using cloud nearer edge system [26]. The system design allows the user to access the medical images within their scope.…”
Section: Wearable Healthcare Devicesmentioning
confidence: 99%
“…In the medical imaging system, accessing time is reduced by using cloud nearer edge system [26]. The system design allows the user to access the medical images within their scope.…”
Section: Wearable Healthcare Devicesmentioning
confidence: 99%
“…Compared with cloud computing, it is closer to the data owner. In data transmission, the fog node layer is added to reduce the delay and bandwidth [11], [12]. Hu et al [13] proposed a security and privacy protection scheme based on the fog computing framework, which did not consider the data transmission model in the fog computing framework.…”
Section: Introductionmentioning
confidence: 99%
“…Fog computing, also known as edge computing, is a growing trend in the computing domain as cloud computing has issues with security, latency, and high running costs. Adding an extra layer of computing offers better localization of data and better security [4], [5]. As the middle layer computes data from fewer number of nodes with less data, the computing time and power consumption also reduces.…”
Section: Introductionmentioning
confidence: 99%