مقاله انگلیسی رایگان در مورد محاسبات لبه موبایل، مه و غیره: بررسی تهدیدها و چالش ها – الزویر 2018

 

مشخصات مقاله
ترجمه عنوان مقاله محاسبات لبه موبایل، مه و غیره: بررسی و تحلیل تهدیدها و چالش های امنیتی
عنوان انگلیسی مقاله Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
انتشار مقاله سال 2018
تعداد صفحات مقاله انگلیسی 67 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه الزویر
نوع نگارش مقاله
مقاله پژوهشی (Research Article)
مقاله بیس این مقاله بیس نمیباشد
نمایه (index) Scopus – Master Journal List – JCR
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
5.341 در سال 2017
شاخص H_index 85 در سال 2019
شاخص SJR 0.844 در سال 2017
شناسه ISSN 0167-739X
شاخص Quartile (چارک) Q1 در سال 2017
رشته های مرتبط مهندسی کامپیوتر
گرایش های مرتبط رایانش ابری، امنیت اطلاعات
نوع ارائه مقاله
ژورنال
مجله  نسل آینده سیستم های کامپیوتری – Future Generation Computer Systems
دانشگاه  Computer Science Department – University of Malaga – Ada Byron building – Spain
کلمات کلیدی امنیت، حریم خصوصی، محاسبات ابری، محاسبات مه، محاسبات لبه موبایل، محاسبات ابری موبایل
کلمات کلیدی انگلیسی Security، Privacy، Cloud computing، Fog computing، Mobile edge computing، Mobile cloud computing
شناسه دیجیتال – doi
http://dx.doi.org/10.1016/j.future.2016.11.009
کد محصول  E10670
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract

1- Introduction

2- Overview of edge paradigms

3- Analysis of features and synergies

4- Security threats

5- Security challenges and opportunities

6- Conclusions

References

بخشی از متن مقاله:

Abstract

For various reasons, the cloud computing paradigm is unable to meet certain requirements (e.g. low latency and jitter, context awareness, mobility support) that are crucial for several applications (e.g. vehicular networks, augmented reality). To fulfill these requirements, various paradigms, such as fog computing, mobile edge computing, and mobile cloud computing, have emerged in recent years. While these edge paradigms share several features, most of the existing research is compartmentalized; no synergies have been explored. This is especially true in the field of security, where most analyses focus only on one edge paradigm, while ignoring the others. The main goal of this study is to holistically analyze the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration. In our results, we will show that all edge paradigms should consider the advances in other paradigms.

Introduction

Cloud computing has taken the world by storm. In this category of utility computing, a collection of computing resources (e.g. network, servers, storage) are pooled to serve multiple consumers, using a multi-tenant model. These resources are available over a network, and accessed through standard mechanisms [1]. The cloud computing paradigm provides a variety of deployment models and service models, from public clouds (organizations provide cloud computing services to any customer) to private clouds (organizations deploy their own private cloud computing platform), and from Infrastructure as a Service models (IaaS, where fundamental computing resources are offered as a capability) to Software as a Service models (SaaS, where applications are offered as a capability), among other things. The benefits of cloud computing – minimal management effort, convenience, rapid elasticity, pay per use, ubiquity – have given birth to a multi-billion industry that is growing worldwide [2]. Despite its benefits, cloud computing is not a panacea. Generally, public cloud vendors have built a few large data centers in various parts of the world. These large-scale, commodity-computer data centers have enough computing resources to serve a very large number of users. However, this centralization of resources implies a large average separation between end user devices and their clouds, which in turn increases the average network latency and jitter [3]. Because of this physical distance, cloud services are not able to directly access local contextual information, such as precise user location, local network conditions, or even information about users’ mobility behaviour. For various delay-sensitive applications, such as vehicular networks and augmented reality, these requirements (low latency and jitter, context awareness, mobility support) are needed.

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا