مشخصات مقاله | |
ترجمه عنوان مقاله | محاسبات لبه موبایل، مه و غیره: بررسی و تحلیل تهدیدها و چالش های امنیتی |
عنوان انگلیسی مقاله | Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 67 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله پژوهشی (Research Article) |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | Scopus – Master Journal List – JCR |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
5.341 در سال 2017 |
شاخص H_index | 85 در سال 2019 |
شاخص SJR | 0.844 در سال 2017 |
شناسه ISSN | 0167-739X |
شاخص Quartile (چارک) | Q1 در سال 2017 |
رشته های مرتبط | مهندسی کامپیوتر |
گرایش های مرتبط | رایانش ابری، امنیت اطلاعات |
نوع ارائه مقاله |
ژورنال |
مجله | نسل آینده سیستم های کامپیوتری – Future Generation Computer Systems |
دانشگاه | Computer Science Department – University of Malaga – Ada Byron building – Spain |
کلمات کلیدی | امنیت، حریم خصوصی، محاسبات ابری، محاسبات مه، محاسبات لبه موبایل، محاسبات ابری موبایل |
کلمات کلیدی انگلیسی | Security، Privacy، Cloud computing، Fog computing، Mobile edge computing، Mobile cloud computing |
شناسه دیجیتال – doi |
http://dx.doi.org/10.1016/j.future.2016.11.009 |
کد محصول | E10670 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract
1- Introduction 2- Overview of edge paradigms 3- Analysis of features and synergies 4- Security threats 5- Security challenges and opportunities 6- Conclusions References |
بخشی از متن مقاله: |
Abstract For various reasons, the cloud computing paradigm is unable to meet certain requirements (e.g. low latency and jitter, context awareness, mobility support) that are crucial for several applications (e.g. vehicular networks, augmented reality). To fulfill these requirements, various paradigms, such as fog computing, mobile edge computing, and mobile cloud computing, have emerged in recent years. While these edge paradigms share several features, most of the existing research is compartmentalized; no synergies have been explored. This is especially true in the field of security, where most analyses focus only on one edge paradigm, while ignoring the others. The main goal of this study is to holistically analyze the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration. In our results, we will show that all edge paradigms should consider the advances in other paradigms. Introduction Cloud computing has taken the world by storm. In this category of utility computing, a collection of computing resources (e.g. network, servers, storage) are pooled to serve multiple consumers, using a multi-tenant model. These resources are available over a network, and accessed through standard mechanisms [1]. The cloud computing paradigm provides a variety of deployment models and service models, from public clouds (organizations provide cloud computing services to any customer) to private clouds (organizations deploy their own private cloud computing platform), and from Infrastructure as a Service models (IaaS, where fundamental computing resources are offered as a capability) to Software as a Service models (SaaS, where applications are offered as a capability), among other things. The benefits of cloud computing – minimal management effort, convenience, rapid elasticity, pay per use, ubiquity – have given birth to a multi-billion industry that is growing worldwide [2]. Despite its benefits, cloud computing is not a panacea. Generally, public cloud vendors have built a few large data centers in various parts of the world. These large-scale, commodity-computer data centers have enough computing resources to serve a very large number of users. However, this centralization of resources implies a large average separation between end user devices and their clouds, which in turn increases the average network latency and jitter [3]. Because of this physical distance, cloud services are not able to directly access local contextual information, such as precise user location, local network conditions, or even information about users’ mobility behaviour. For various delay-sensitive applications, such as vehicular networks and augmented reality, these requirements (low latency and jitter, context awareness, mobility support) are needed. |