2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2017
DOI: 10.1109/icccnt.2017.8204036
|View full text |Cite
|
Sign up to set email alerts
|

Security-based service broker policy for FOG computing environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…[10], [11], [20], [21], [22] Experiments Simulations Quantitative [12], [15], [17], [19] Experiments Testbed Quantitative [13], [16], [18] Literature review One of the strong research strategies for concept development is the literature review [25]. In [13], [16], [18] literature review research strategy is used.…”
Section: Methods Of Data Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…[10], [11], [20], [21], [22] Experiments Simulations Quantitative [12], [15], [17], [19] Experiments Testbed Quantitative [13], [16], [18] Literature review One of the strong research strategies for concept development is the literature review [25]. In [13], [16], [18] literature review research strategy is used.…”
Section: Methods Of Data Analysismentioning
confidence: 99%
“…A reputationbased trust evaluation model is proposed in [23]. • Decision Making: Fog layer decision making can improve trust in IoT [22]. Fog layer decision support can increase security in IoT as well as improve the quality of service concerning time while communication to the cloud layer is expensive and hard to process data in resource constraint IoT devices.…”
Section: • Intrusion Prevention System (Ips): Implementationmentioning
confidence: 99%
“…This framework is custom-made for fog situations, where load balancing is a critical component for maximizing resource efficiency, and bandwidth, and achieving the desired level of service (QoS). The studies in the article [41] discuss the fog computing environment, employ quantization datacenter security and introduce a suitable security-based service broker policy (SbSBP) to allocate the best datacenter(s) to serve users' demands based on cost, time, and security requirements. The concept of reconfigure ability has been included, taking into account the dynamic behavior of fog computing.…”
Section: Related Workmentioning
confidence: 99%