2022
DOI: 10.1007/s00607-022-01053-w
|View full text |Cite
|
Sign up to set email alerts
|

An efficient framework for trust evaluation of secure service selection in fog computing based on QoS, reputation, and social criteria

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 53 publications
0
2
0
Order By: Relevance
“…The remedy can withstand a substantial population of rogue nodes and successfully prevent trust-based attacks. The author's [38] research work identified a comprehensive collection of efficient criteria for highly secured selection in a fog-based computing environment. Furthermore, a good work decision-making technique with fuzzy and excellent worst techniques is used to evaluate the contribution level of every metric on trust level, considering metrics ambiguity.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The remedy can withstand a substantial population of rogue nodes and successfully prevent trust-based attacks. The author's [38] research work identified a comprehensive collection of efficient criteria for highly secured selection in a fog-based computing environment. Furthermore, a good work decision-making technique with fuzzy and excellent worst techniques is used to evaluate the contribution level of every metric on trust level, considering metrics ambiguity.…”
Section: Related Workmentioning
confidence: 99%
“…While these approaches have shown improvements in trustworthiness and security, they must offer a comprehensive framework that addresses the broader challenges of trust management and network performance optimization. Furthermore, existing trust management systems [37][38][39][40][41][42][43] have mainly relied on traditional measures such as reputation, quality of service, and social ties between nodes. While these approaches have provided valuable insights, they often need to pay more attention to fog computing environments' specific requirements and characteristics.…”
Section: Related Workmentioning
confidence: 99%