2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC) 2019
DOI: 10.1109/fmec.2019.8795332
|View full text |Cite
|
Sign up to set email alerts
|

Uncertainty-Aware Authentication Model for Fog Computing in IoT

Abstract: Since the term "Fog Computing" has been coined by Cisco Systems in 2012, security and privacy issues of this promising paradigm are still open challenges. Among various security challenges, Access Control is a crucial concern for all cloud computing-like systems (e.g. Fog computing, Mobile edge computing) in the IoT era. Therefore, assigning the precise level of access in such an inherently scalable, heterogeneous and dynamic environment is not easy to perform. This work defines the uncertainty challenge for a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0
5

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(25 citation statements)
references
References 30 publications
0
20
0
5
Order By: Relevance
“…Towards this direction, effort should be placed on developing and implementing novel and efficient quantitative security risk estimation algorithms, suitable for sensitive applications. In the literature, various classification algorithms, such as decision trees [26]- [29], Naïve Bayes [16], [27], logistic regression [24], [27], etc. and other approaches, such as fuzzy logic [26], [30], [31] and Monte Carlo simulation [26], [32] have been proposed for quantitative risk estimation.…”
Section: Bmentioning
confidence: 99%
“…Towards this direction, effort should be placed on developing and implementing novel and efficient quantitative security risk estimation algorithms, suitable for sensitive applications. In the literature, various classification algorithms, such as decision trees [26]- [29], Naïve Bayes [16], [27], logistic regression [24], [27], etc. and other approaches, such as fuzzy logic [26], [30], [31] and Monte Carlo simulation [26], [32] have been proposed for quantitative risk estimation.…”
Section: Bmentioning
confidence: 99%
“…Decision tree is a supervised classification algorithm that performs hierarchical decision making on the feature values based on a set of rules presented in a tree-like structure [26], [27]. As in all machine learning algorithms, firstly, data are divided into training and validation data sets.…”
Section: ) Machine Learning Classification Algorithms A) Decision Treementioning
confidence: 99%
“…In particular, any decision made divides the tree based on a criterion in a way that the training data is split into two or more branches. The main objective is to find the optimal split criterion so as the number of mixing the class variables in each branch of the tree is reduced as much as possible [27]. Afterwards, validation data are used to validate the decision tree and make necessary adjustments to the tree in order to make it more efficient [26], [28].…”
Section: ) Machine Learning Classification Algorithms A) Decision Treementioning
confidence: 99%
See 2 more Smart Citations