2017
DOI: 10.1109/access.2017.2716782
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Secure Mobile Edge Computing Framework for Hajj

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
30
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 52 publications
(30 citation statements)
references
References 43 publications
0
30
0
Order By: Relevance
“…Recent advancements in decentralized data transactions via Blockchain [5], [11], IoT [12], MEC and Fog Computing [2], [7], [30] and 5G device-to-device (D2D) communication capability [27] will allow secure sharing economy services wherein any number of entities within a mass crowd, such as in a smart city, can perform a multiparty transaction in a decentralized manner [6], [7], [24], [25]. For example, recent medical equipment, such as CT Scan machine, has embedded IoT devices that enable data processing locally and upload the results to Blockchain and off-chain nodes running at the nearby edge [3], [7], [9], [22], [24], [28], [31]. Two parties can securely perform any online activity or financial or business transaction [3], [13], [26], [37].…”
Section: Related Studymentioning
confidence: 99%
See 2 more Smart Citations
“…Recent advancements in decentralized data transactions via Blockchain [5], [11], IoT [12], MEC and Fog Computing [2], [7], [30] and 5G device-to-device (D2D) communication capability [27] will allow secure sharing economy services wherein any number of entities within a mass crowd, such as in a smart city, can perform a multiparty transaction in a decentralized manner [6], [7], [24], [25]. For example, recent medical equipment, such as CT Scan machine, has embedded IoT devices that enable data processing locally and upload the results to Blockchain and off-chain nodes running at the nearby edge [3], [7], [9], [22], [24], [28], [31]. Two parties can securely perform any online activity or financial or business transaction [3], [13], [26], [37].…”
Section: Related Studymentioning
confidence: 99%
“…For example, recent medical equipment, such as CT Scan machine, has embedded IoT devices that enable data processing locally and upload the results to Blockchain and off-chain nodes running at the nearby edge [3], [7], [9], [22], [24], [28], [31]. Two parties can securely perform any online activity or financial or business transaction [3], [13], [26], [37]. In the context of a sharing economy application [1], a person can perform health checkups on demand in different mobile edge locations, thereby providing ubiquitous sharing economy service access of health data [10], [13], [18], [19], [25], [26], [29], [38].…”
Section: Related Studymentioning
confidence: 99%
See 1 more Smart Citation
“…Abbas et al [17] provided a mobile edge computing architecture and elaborated its advantages, potential application areas and future research directions. Rahman et al [18] developed a mobile edge computing framework to support real-time and locationaware personalized services. Baktir et al [19] provided a comprehensive survey of edge computing and discussed its technical challenges in depth.…”
Section: Related Workmentioning
confidence: 99%
“…Due to the industry 4.0 revolution, sharing economy services can take benefit from IoT and edge computing paradigm, not only for processing large amounts of data, but also for incorporating decentralized security mechanisms. For example, blockchain and off-chain can provide data security and privacy of the IoT data and the identity of the stakeholders [1] [2]. Two parties, without knowing each other, can perform a sharing economy business contract in which financial transaction or multimedia IoT data sharing needs to be performed without a middleman [3] [4] [5].…”
Section: Introductionmentioning
confidence: 99%