2015
DOI: 10.1007/978-3-319-11227-5_22
|View full text |Cite
|
Sign up to set email alerts
|

Smart Human Security Framework Using Internet of Things, Cloud and Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
23
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(24 citation statements)
references
References 15 publications
1
23
0
Order By: Relevance
“…In our cases, the service providers are responsible for taking further actions, regardless of whether they receive the instructions from the cloud, from the local neighborhood sink, or whether they make the decisions by their own. We found similar communication flow only in [39].…”
Section: Iot Framework For Hcssupporting
confidence: 58%
“…In our cases, the service providers are responsible for taking further actions, regardless of whether they receive the instructions from the cloud, from the local neighborhood sink, or whether they make the decisions by their own. We found similar communication flow only in [39].…”
Section: Iot Framework For Hcssupporting
confidence: 58%
“…Herein, we mainly concentrate on the second situation. To achieve sound interactions among different layers (i.e., user device layer, edge node layer and cloud server layer), hybrid communication technologies are applied in edge computing, including wired communications (such as Ethernet, and optical fiber) and wireless communications (such as ZigBee, WiFi, and LTE) [26]. The communication between cloud server and edge nodes and the communication among edge nodes are usually supported by wired communication technologies, while edge nodes and IoT devices communicate with each other with wireless communication technologies.…”
Section: B Edge Computing Architecturementioning
confidence: 99%
“…Sehgal et al have worked on the security framework for the domain of fog computing and devised security mechanisms to tackle security challenges in the fields of IoT, cloud and fog computing. A research work also worked extensively on the comparisons of fog computing and cloud computing and their security and forensics gap.…”
Section: Literature Surveymentioning
confidence: 99%
“…These makes all the information on the fog servers localized and decentralized for every mall in a particular city. Collectively, all the information of the fog servers will be stored on a centralized cloud data center …”
Section: Applications Of Fog Computingmentioning
confidence: 99%