2018
DOI: 10.1007/978-3-030-02686-8_10
|View full text |Cite
|
Sign up to set email alerts
|

A Novel and Scalable Naming Strategy for IoT Scenarios

Abstract: Fog-to-Cloud (F2C) is a novel paradigm aimed at increasing the benefits brought by the growing Internet-of-Things (IoT) devices population at the edge of the network. F2C is intended to manage the available resources from the core to the edge of the network, allowing services to choose and use either a specific cloud or fog offer or a combination of both. Recognized the key benefits brought by F2C systems, such as low-latency for real-time services, location awareness services, mobility support and the possibi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
2

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 12 publications
0
3
0
2
Order By: Relevance
“…[14]- [15] [16]- [17] Cloud Access Security Brokers (CASBs) [18] Big Data Security Analytics [19][20]…”
Section: Tecnologías Emergentes Estudiomentioning
confidence: 99%
“…[14]- [15] [16]- [17] Cloud Access Security Brokers (CASBs) [18] Big Data Security Analytics [19][20]…”
Section: Tecnologías Emergentes Estudiomentioning
confidence: 99%
“…IDaaS, tiene como enfoque principal analizar las plataformas de nube de IoT populares a la luz de la solución de varios dominios de servicio, como el desarrollo de aplicaciones, la gestión de dispositivos, la gestión de sistemas, la gestión de heterogeneidad, la gestión de datos, las herramientas para el análisis, la implementación, la supervisión, la visualización y la investigación [5]. Por otra parte, CASBs tiene como objetivo mejorar las características de seguridad y colocando los datos entre la nube pública y sus consumidores, es decir, se usa como una capa intermedia entre la nube y los usuarios finales, la característica de diseño de este estudio es que reduce con éxito el costo de comunicación adicional que generalmente se encuentra alto en sistemas similares [6].…”
Section: Fuente: Propiaunclassified
“…9, n°3, pp. 18-31, 2021 DOI: https://doi.org/10.17081/invinno.9.3.5340 wifi(5), ninguno (0). Determinando así, una escala de 0 a 10 para la evaluación final de cada característica, en donde 0 es el valor más bajo y 10 es el valor más alto para cada criterio, una vez realizada la evaluación con base en los criterios y puntuaciones anteriormente mencionados, se determinó que el dispositivo que presenta el puntaje más alto es la Raspberry Pi 3, con un valor de 45,2 puntos.…”
unclassified
“…An identity management model based on network resource ID fragmentation is proposed in [ 44 ]. The authors discussed a fog-to-cloud solution for the identity management of network resources.…”
Section: Related Workmentioning
confidence: 99%
“…We have also proposed fog layer identity management, which is near to the edge devices. However, the main difference between the solution in [ 44 ] and our model is we have proposed distributed decentralized identity management via IDMS servers at fog layer but in [ 44 ] the detail of the database management system of the IDMS solution is discussed. We have also discussed in detail how secure communication is performed between the edge nodes, edge gateways, and identity management server which is missing in [ 44 ].…”
Section: Related Workmentioning
confidence: 99%