• Complain

Wei Chang (editor) - Fog/Edge Computing For Security, Privacy, and Applications

Here you can read online Wei Chang (editor) - Fog/Edge Computing For Security, Privacy, and Applications full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Springer, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Wei Chang (editor) Fog/Edge Computing For Security, Privacy, and Applications

Fog/Edge Computing For Security, Privacy, and Applications: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Fog/Edge Computing For Security, Privacy, and Applications" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

Wei Chang (editor): author's other books


Who wrote Fog/Edge Computing For Security, Privacy, and Applications? Find out the surname, the name of the author of the book and a list of all author's works by series.

Fog/Edge Computing For Security, Privacy, and Applications — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Fog/Edge Computing For Security, Privacy, and Applications" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of FogEdge Computing For Security Privacy and Applications - photo 1
Book cover of Fog/Edge Computing For Security, Privacy, and Applications
Volume 83
Advances in Information Security
Series Editor
Sushil Jajodia
George Mason University, Fairfax, VA, USA

More information about this series at Advances in Information Security http://www.springer.com/series/5576 The purpose of the book series is to establish the state of the art and set the course for future research in information security. The scope of this series includes not only all aspects of computer, network security, and cryptography, but related areas, such as fault tolerance and software assurance. The series serves as a central source of reference for information security research and developments. The series aims to publish thorough and cohesive overviews on specific topics in Information Security, as well as works that are larger in scope than survey articles and that will contain more detailed background information. The series also provides a single point of coverage of advanced and timely topics and a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook.

Editors
Wei Chang and Jie Wu
Fog/Edge Computing For Security, Privacy, and Applications
1st ed. 2021
Logo of the publisher Editors Wei Chang Department of Computer Science - photo 2
Logo of the publisher
Editors
Wei Chang
Department of Computer Science, Saint Josephs University, Philadelphia, PA, USA
Jie Wu
Computer and Information Sciences, Temple University, Philadelphia, PA, USA
ISSN 1568-2633 e-ISSN 2512-2193
Advances in Information Security
ISBN 978-3-030-57327-0 e-ISBN 978-3-030-57328-7
https://doi.org/10.1007/978-3-030-57328-7
Springer Nature Switzerland AG 2021
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Preface

With the advance of computer technology and high-speed networks, we have witnessed the rise of a new technology in fog/edge computing in recent years. The past decade has witnessed a significant advance in cloud technology, Internet of Things (IoT), and 4G/5G wireless communications that expand the traditional computer technology at both macro and micro levels. In the era of big data, IoT includes many sensors, actuators, and mobile devices at the network edges. With the help of 4G and future 5G high-speed communication, data collected at IoT will be sent to the cloud for storage and processing. However, communication latency, due to the sheer volume of data collected at IoT to be transmitted to the cloud, poses a major challenge in cloud technology. Various efforts have been made to allow IoT to perform limited computation and storage; fog/edge computing goes one step further to bring some cloud service close to the network edge.

Fog computing is an architecture that makes use of edge devices to carry out a good amount of computation and storage. Their communication is done locally and/or routed over the Internet and/or 4G/5G. Fog computing supports IoT and consists of a control plane and a data plane. Like cloud computing, fog computing also provides computation, storage, and applications to end-users. However, fog computing is closer to end-users at the network edge (also known as edge computing, although these two terms are sometimes used interchangeably) and has wider geographical distribution. Note that rather than a substitute, fog/edge computing often services as the complement to cloud computing, and in many cases, works together with existing cloud technology, like cloudlet. There are many technical challenges in fog/edge network design, such as computation offloading which deals with delay minimization, energy minimization, a combination of both, and caching which decides both placing caching units and their contents. This book focuses on security and privacy in fog/edge computing.

Security and privacy in fog/edge computing pose some unique challenges as various services are distributed at the network edge. Security and privacy issues can be divided into two parts: system-level and service-level. System-level security and privacy deal with issues in the computing system itself such as modern network design using virtualization and special threats and attacks and their counter methods in intrusion and malware detections. Service-level security and privacy handle issues under a service, which can be broadly divided into authentication and trust, access control, data confidentiality and integrity, privacy preservation, and non-repudiation. Security and privacy issues can also be partitioned in another orthogonal way based on system functions, including service provisioning, data processing, data transmission, and data storage. Note that service decentralization in fog/edge computing offers a double-edged sword, compared to service centralization in cloud computing: fog/edge computing offers more flexibility in the system and network design; however, it also poses some additional challenges in ensuring security and privacy, especially in supporting mobility, device heterogeneity, location-awareness, and lightweight solutions.

To handle the security and privacy issues in fog/edge computing, many secure and privacy-preserved systems, architectures, and algorithms have been designed. Based on the target, we can classify the existing security and privacy solutions to fog/edge computing into four categories: user-centric, device-centric, application-centric, and end-to-end-centric. The user-centric methods focus on the roles of users that participate in the fog/edge computing, and the corresponding security and privacy mechanisms are determined based on the roles. The device-centric methods provide security and privacy solutions for each end device based on its resources, location, and the roles it plays in the applications. The application-centric solutions take full advantage of the power, flexibility, and performance of the existing fog/edge computing systems and consider how to apply policies to different applications to meet their unique security and privacy requirements. The last group, end-to-end-centric, emphasizes the secure and privacy-preserved communications among all participants, such as the remote cloud, edge devices, and end devices. Because of the heterogeneity of the participants and variety of security and privacy goals, more and more fog/edge computing-related schemes have been proposed in the past decade.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Fog/Edge Computing For Security, Privacy, and Applications»

Look at similar books to Fog/Edge Computing For Security, Privacy, and Applications. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Fog/Edge Computing For Security, Privacy, and Applications»

Discussion, reviews of the book Fog/Edge Computing For Security, Privacy, and Applications and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.