2017 IEEE Conference on Communications and Network Security (CNS) 2017
DOI: 10.1109/cns.2017.8228709
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving fog computing paradigm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 17 publications
0
16
0
Order By: Relevance
“…132 • Usage pattern may also refer to the frequency of data being sent to the Fog nodes. 89 • The adversary can infer sensitive information (eg, Smart grid) such as at what times the user is unavailable at home and switch on and off certain appliances. 5 The traditional cryptographic techniques cannot be effective in Fog environment due to its unique characteristics.…”
Section: Challenge Category Challenge Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…132 • Usage pattern may also refer to the frequency of data being sent to the Fog nodes. 89 • The adversary can infer sensitive information (eg, Smart grid) such as at what times the user is unavailable at home and switch on and off certain appliances. 5 The traditional cryptographic techniques cannot be effective in Fog environment due to its unique characteristics.…”
Section: Challenge Category Challenge Descriptionmentioning
confidence: 99%
“…87 • Extra communication and delay due to users' mobility. 89 • Authentication overhead, redundant authentication and poor scalability. 58 • Decoy technique needs extra storage, and cannot differentiate between false positive and false negative.…”
Section: Iot Devices Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…Abubaker et al [15] discusses about two different approaches upon the closeness of fog nodes to the users with the interconnected application while aggregating the nearer nodes for ensuring the security by using the Trusted Third Party Node Scheme (TTPS). The advantage of this TTPS scheme is reduced latency and overhead costs.…”
Section: Privacy-preserving Fog and Edge Computing System Modelmentioning
confidence: 99%
“…For example industrial internet and health monitoring system needs high real time, reliability and high efficiency in millisecond. Therefore, cloud computing under the internet of things cannot fulfil requirement high mobility, location awareness and low latency requirements services [5].…”
Section: Introductionmentioning
confidence: 99%