2020
DOI: 10.1016/j.simpat.2020.102136
|View full text |Cite
|
Sign up to set email alerts
|

From the edge to the cloud: A continuous delivery and preparation model for processing big IoT data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 54 publications
0
8
0
Order By: Relevance
“…Then, according to the ISO 31000 standard (www.iso.org/iso-31000-risk-management.html) accessed on 5 August 2021 for risk management [37], the values of UF are discretized in scales: low ∈ [0, 0.33), medium ∈ [0.33, 0.66) and high ∈ [0.66, 1]. These thresholds indicate the level of performance (_lvl) of each resource r i , as indicates Equation (14).…”
Section: Behaviormentioning
confidence: 99%
See 1 more Smart Citation
“…Then, according to the ISO 31000 standard (www.iso.org/iso-31000-risk-management.html) accessed on 5 August 2021 for risk management [37], the values of UF are discretized in scales: low ∈ [0, 0.33), medium ∈ [0.33, 0.66) and high ∈ [0.66, 1]. These thresholds indicate the level of performance (_lvl) of each resource r i , as indicates Equation (14).…”
Section: Behaviormentioning
confidence: 99%
“…In these types of infrastructures (any combination of edge, fog, or cloud), the virtual containers ( ) are key to deploy services on each infrastructure [ 11 , 12 , 13 ]. These services provide dataflows from the IoT to the cloud that produce different types of data and information, which proves to be key for organizations to conduct critical decision-making processes [ 14 , 15 , 16 ].…”
Section: Introductionmentioning
confidence: 99%
“…End-to-end solutions have been widely studied and developed to prepare data by adding non-functional requirements for mitigating risk just before sending them to different environments such as the cloud or the fog [19], [33]- [36], as data have to be moved between different infrastructures, to prevent confidentiality violation, content alteration and repudiation of events by omissions and unavailability of data or resources in environments (at any of the edge, fog or cloud).…”
Section: Related Workmentioning
confidence: 99%
“…The network layer processes the received data and transmits the collected data towards the upstreams nodes. The data can be further processed at the high-end layer and disclose to derive useful knowledge for various smart services ( Sánchez-Gallegos et al, 2020 ; Gheisari, Wang & Chen, 2020 ; Wang et al, 2020b ). To sum up, no matter how diverse the CPS application is, follow these five necessary steps: 1) Sense; 2) Transmit; 3) Store; 4) Analyze; 5) Act ( Tao et al, 2020 ; Tianxing et al, 2020 ; Rahman et al, 2019a ).…”
Section: Igtdc: Trustworthy Data Collection Frameworkmentioning
confidence: 99%