2020
DOI: 10.4108/eai.20-10-2020.166666
|View full text |Cite
|
Sign up to set email alerts
|

Cloud, Edge, and Fog Computing and Security for the Internet of Things

Abstract: In this paper, a method is purposed that detects the masquerade activity of cloud data. In this method, the combination of the decoy technique and the user's behaviour profile technique are used to improve the security of data in the cloud. This research has the main focus on understanding the use of these computing paradigms with the internet of things. The security concerns and its possible solutions are described. Therefore, the comparative analysis is conducted, which elaborates on each paradigm in the int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 16 publications
0
0
0
Order By: Relevance