Utilizing technologies of fog computing in educational IoT systems: privacy, security, and agility perspective

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

Security and Privacy Issues of Fog Computing: A Survey

Fog computing is a promising computing paradigm that extends cloud computing to the edge of networks. Similar to cloud computing but with distinct characteristics, fog computing faces new security and privacy challenges besides those inherited from cloud computing. In this paper, we have surveyed these challenges and corresponding solutions in a brief manner.

متن کامل

Data Security and Privacy in the IoT

Deploying existing data security solutions to the Internet of Things (IoT) is not straightforward because of device heterogeneity, highly dynamic and possibly unprotected environments, and large scale. In this paper, after outlining key challenges in data security and privacy, we summarize research directions for securing IoT data, including efficient and scalable encryption protocols, software...

متن کامل

Applying Security Policies in Small Business Utilizing Cloud Computing Technologies

Over a decade ago, cloud computing became an important topic for small and large businesses alike. The new concept promises scalability, security, cost reduction, portability, and availability. While addressing this issue over the past several years, there have been intensive discussions about the importance of cloud computing technologies. Therefore, this paper reviews the transition from trad...

متن کامل

Security and privacy threats in IoT architectures

In this paper, we describe an overall architecture for Internet of Things (IoT) and analyze the known and new threats for the security, privacy and trust (SPT) at different levels of architecture, with attacker centric and system centric approaches. Our strong view is that IoT will be an important part of the global huge ICT infrastructure (“future Internet”) humanity will be strongly relying o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Big Data

سال: 2020

ISSN: 2196-1115

DOI: 10.1186/s40537-020-00372-z