Fog/edge computing for security, privacy, and applications

著者

    • Chang, Wei
    • Wu, Jie

書誌事項

Fog/edge computing for security, privacy, and applications

Wei Chang, Jie Wu, editors

(Advances in information security, v. 83)

Springer, c2021

  • : [hardback]

大学図書館所蔵 件 / 1

この図書・雑誌をさがす

注記

Includes bibliographical references

内容説明・目次

内容説明

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

目次

Part I: Overview of Fog/Edge Computing 1. "Confluence of 4G LTE, 5G, fog, and cloud computing and understanding security issues" Khaldoon Alshouiliy (University of Cincinnati, USA) Dharma Agrawal (University of Cincinnati, USA) 2. "An overview of the Edge Computing in Modern Digital Age" Reinaldo Padilha Franca (University of Campinas- UNICAMP, Brazil) Ana Carolina Borges Monteiro (University of Campinas- UNICAMP, Brazil) Rangel Arthur (University of Campinas- UNICAMP, Brazil) Yuzo Lano (University of Campinas- UNICAMP, Brazil) Part II: Security in Fog/Edge Computing 3. "Secure Search and Storage Services in Fog/Edge Computing" Qin Liu (Hunan University, China) 4. "Collaborative Intrusion Detection Schemes in Fog-to-Things Computing" Abebe Diro (La Trobe University, Australia) Abdun Mahmood (La Trobe University, Australia) Naveen Chilamkurti (La Trobe University, Australia) 5. "On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management" Ali Shoker (VORTEX Colab, Portugal) Hussam Yactine (INESC TEC and Universidade do Minho, Portugal) Part III: Privacy in Fog/Edge Computing 6. "Privacy Issues in Edge Computing" Qi Xia (College of William and Mary, USA) Zeyi Tao (College of William and Mary, USA) Qun Li (College of William and Mary, USA) 7. "Privacy-preserving Edge Video Analytics" Miao Hu (Sun Yat-sen University, China) Yao Fu (Sun Yat-sen University, China) Di Wu (Sun Yat-sen University, China) Part IV: Architectural Design in Fog/Edge Computing 8. "Vulnerabilities in Fog/Edge Computing from Architectural Perspectives" Nhu-Ngoc Dao (Sejong University, South Korea) Ngoc-Thanh Dinh (Soongsil University, South Korea) Quoc-Viet Pham (Pusan National University, South Korea) Trung V. Phan (Technische Universitat Chemnitz, Germany) Sungrae Cho (Chung-Ang University, South Korea) Torsten Braun (University of Bern, Switzerland) 9. "Security and Intelligent Management for Fog/Edge Computing Resources" Jun Wu (Shanghai Jiao Tong University, China) 10. "Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing" Zichuan Xu (Dalian University of Technology, China) Weifa Liang (The Australian National University, Australia) 11. "Blockchain-based Security Services for Fog Computing" Arvind Kiwelekar (Dr. Babasaheb Ambedkar Technological University, India) Pramod Patil (Dr. Babasaheb Ambedkar Technological University, India Laxman D. Netak (Dr. Babasaheb Ambedkar Technological University, India) Sanjay U Waikar (Dr. Babasaheb Ambedkar Technological University, India) Part V: Applications of Fog/Edge Computing 12. "Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions" G. S. S. Chalapathi (BITS Pilani, Pilani Campus, India, and The University of Melbourne, Australia) Vinay Chamola (BITS Pilani, Pilani Campus, India) Aabhaas Vaish (BITS Pilani, Pilani Campus, India) Rajkumar Buyya (The University of Melbourne, Australia) 13. "Security Problems in Edge Computing and Augmented Reality" Sarah M. Lehman (Temple University, USA) Chiu C. Tan (Temple University, USA) 14. "Towards a Security-aware Deployment of Data Streaming Applications in Fog Computing" Gariele Russo Russo (University of Rome Tor Vergata, Italy) Valeria Cardellini (University of Rome Tor Vergata, Italy) Francesco Lo Presti (University of Rome Tor Vergata, Italy) Matteo Nardelli (University of Rome Tor Vergata, Italy) 15. "Blockchain of Finite-Lifetime Blocks for Edge-IoT Applications" Shravan Garlapati (Qualcomm Technologies Inc.)

「Nielsen BookData」 より

関連文献: 1件中  1-1を表示

詳細情報

ページトップへ