2017
DOI: 10.1109/access.2017.2766180
|View full text |Cite
|
Sign up to set email alerts
|

Fog Computing Over IoT: A Secure Deployment and Formal Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(21 citation statements)
references
References 40 publications
0
21
0
Order By: Relevance
“…c) Access Control Based on Other Technology: Other ways were explored to implement access control in edge computing. For secure data outsourcing and access, Zahra et al [89] focused on adding the Shibboleth protocol in a fog-IoT network to achieve cross domain data access control between user devices and fog nodes. The authors detailly introduced the workflow of the Shibboleth system and further demonstrated its correctness.…”
Section: Secure Data Storage In Edge Computingmentioning
confidence: 99%
“…c) Access Control Based on Other Technology: Other ways were explored to implement access control in edge computing. For secure data outsourcing and access, Zahra et al [89] focused on adding the Shibboleth protocol in a fog-IoT network to achieve cross domain data access control between user devices and fog nodes. The authors detailly introduced the workflow of the Shibboleth system and further demonstrated its correctness.…”
Section: Secure Data Storage In Edge Computingmentioning
confidence: 99%
“…Zahra et al [19] examine the security of data communication within Fog-IoT systems. The authors introduced a mechanism to strengthen the communication security and formally verify it against a set of security properties.…”
Section: Related Workmentioning
confidence: 99%
“…Security has also been the subject of the application of formal verification t echniques i n t he c ontext o f I ndustry 4.0 systems, particularly when it comes to the issue of the integration of various system components. In [36], for example, the Shibboleth federated identity and single-sign on protocol [37] was proposed as a solution to securely connect Fog clients and Fog nodes [38] in automation systems. High-level Petri nets [39] were then used to demonstrate the reliability and robustness of this connection.…”
Section: Related Workmentioning
confidence: 99%