Architecture and security issues in fog computing applications:
As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the l...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2020]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-706 DE-83 DE-898 Volltext |
Zusammenfassung: | As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781799801962 |
DOI: | 10.4018/978-1-7998-0194-8 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046218967 | ||
003 | DE-604 | ||
005 | 20211108 | ||
007 | cr|uuu---uuuuu | ||
008 | 191028s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781799801962 |9 978-1-7998-0196-2 | ||
035 | |a (OCoLC)1126563175 | ||
035 | |a (DE-599)BVBBV046218967 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-706 |a DE-83 |a DE-898 | ||
245 | 1 | 0 | |a Architecture and security issues in fog computing applications |c Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani |
264 | 1 | |a Hershey, PA |b IGI Global |c [2020] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a 1. Fog resource allocation through machine learning algorithm / Gowri A. S., Shanthi Bala P. -- 2. A novel resource management framework for fog computing by using machine learning algorithm / Shanthi Thangam Manukumar, Vijayalakshmi Muthuswamy -- 3. [Retracted] Security issues in fog computing for Internet of Things / D.N. Kartheek, Bharath Bhushan -- 4. Analysis of identity-based cryptography in Internet of Things (IoT) / Aravind Karrothu, Jasmine Norman -- 5. Cloud security architecture based on fully homomorphic encryption / Vaishali Ravindra Thakare, K. John Singh -- 6. Object detection in fog computing using machine learning algorithms / Peyakunta Bhargavi, Singaraju Jyothi -- 7. Distributed intelligence platform to the edge computing / Xalphonse Inbaraj -- 8. Internet of Things and fog computing applications in intelligent transportation systems / Korupalli V. Rajesh Kumar, K. Dinesh Kumar, Ravi Kumar Poluru, Syed Muzamil Basha, M. Praveen Kumar Reddy -- 9. Agribot / Ravi Kumar Poluru, M. Praveen Kumar Reddy, Rajesh Kaluri, Kuruva Lakshmanna, G. Thippa Reddy -- 10. Towards efficient resource management in fog computing : a survey and future directions / M. Sudhakara, K. Dinesh Kumar, Ravi Kumar Poluru, R. Lokesh Kumar, S. Bharath Bhushan | |
520 | |a As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems | ||
650 | 4 | |a Cloud computing | |
650 | 4 | |a Cloud computing / Security measures | |
650 | 4 | |a Internet of things | |
700 | 1 | |a Goundar, Sam |4 edt | |
700 | 1 | |a Bhushan, S. Bharath |4 edt | |
700 | 1 | |a Rayani, Praveen Kumar |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-7998-0194-8 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, softcover |z 978-1-7998-0195-5 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-0194-8 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
966 | e | |u https://doi.org/10.4018/978-1-7998-0194-8 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-0194-8 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-0194-8 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-0194-8 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805076698038796288 |
---|---|
adam_text | |
any_adam_object | |
author2 | Goundar, Sam Bhushan, S. Bharath Rayani, Praveen Kumar |
author2_role | edt edt edt |
author2_variant | s g sg s b b sb sbb p k r pk pkr |
author_facet | Goundar, Sam Bhushan, S. Bharath Rayani, Praveen Kumar |
building | Verbundindex |
bvnumber | BV046218967 |
collection | ZDB-98-IGB |
contents | 1. Fog resource allocation through machine learning algorithm / Gowri A. S., Shanthi Bala P. -- 2. A novel resource management framework for fog computing by using machine learning algorithm / Shanthi Thangam Manukumar, Vijayalakshmi Muthuswamy -- 3. [Retracted] Security issues in fog computing for Internet of Things / D.N. Kartheek, Bharath Bhushan -- 4. Analysis of identity-based cryptography in Internet of Things (IoT) / Aravind Karrothu, Jasmine Norman -- 5. Cloud security architecture based on fully homomorphic encryption / Vaishali Ravindra Thakare, K. John Singh -- 6. Object detection in fog computing using machine learning algorithms / Peyakunta Bhargavi, Singaraju Jyothi -- 7. Distributed intelligence platform to the edge computing / Xalphonse Inbaraj -- 8. Internet of Things and fog computing applications in intelligent transportation systems / Korupalli V. Rajesh Kumar, K. Dinesh Kumar, Ravi Kumar Poluru, Syed Muzamil Basha, M. Praveen Kumar Reddy -- 9. Agribot / Ravi Kumar Poluru, M. Praveen Kumar Reddy, Rajesh Kaluri, Kuruva Lakshmanna, G. Thippa Reddy -- 10. Towards efficient resource management in fog computing : a survey and future directions / M. Sudhakara, K. Dinesh Kumar, Ravi Kumar Poluru, R. Lokesh Kumar, S. Bharath Bhushan |
ctrlnum | (OCoLC)1126563175 (DE-599)BVBBV046218967 |
doi_str_mv | 10.4018/978-1-7998-0194-8 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV046218967</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211108</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">191028s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799801962</subfield><subfield code="9">978-1-7998-0196-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1126563175</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046218967</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Architecture and security issues in fog computing applications</subfield><subfield code="c">Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Fog resource allocation through machine learning algorithm / Gowri A. S., Shanthi Bala P. -- 2. A novel resource management framework for fog computing by using machine learning algorithm / Shanthi Thangam Manukumar, Vijayalakshmi Muthuswamy -- 3. [Retracted] Security issues in fog computing for Internet of Things / D.N. Kartheek, Bharath Bhushan -- 4. Analysis of identity-based cryptography in Internet of Things (IoT) / Aravind Karrothu, Jasmine Norman -- 5. Cloud security architecture based on fully homomorphic encryption / Vaishali Ravindra Thakare, K. John Singh -- 6. Object detection in fog computing using machine learning algorithms / Peyakunta Bhargavi, Singaraju Jyothi -- 7. Distributed intelligence platform to the edge computing / Xalphonse Inbaraj -- 8. Internet of Things and fog computing applications in intelligent transportation systems / Korupalli V. Rajesh Kumar, K. Dinesh Kumar, Ravi Kumar Poluru, Syed Muzamil Basha, M. Praveen Kumar Reddy -- 9. Agribot / Ravi Kumar Poluru, M. Praveen Kumar Reddy, Rajesh Kaluri, Kuruva Lakshmanna, G. Thippa Reddy -- 10. Towards efficient resource management in fog computing : a survey and future directions / M. Sudhakara, K. Dinesh Kumar, Ravi Kumar Poluru, R. Lokesh Kumar, S. Bharath Bhushan</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of things</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goundar, Sam</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhushan, S. Bharath</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rayani, Praveen Kumar</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-7998-0194-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, softcover</subfield><subfield code="z">978-1-7998-0195-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-0194-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-0194-8</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-0194-8</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-0194-8</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-0194-8</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046218967 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:01:26Z |
institution | BVB |
isbn | 9781799801962 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031597685 |
oclc_num | 1126563175 |
open_access_boolean | |
owner | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
owner_facet | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global |
record_format | marc |
spelling | Architecture and security issues in fog computing applications Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani Hershey, PA IGI Global [2020] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier 1. Fog resource allocation through machine learning algorithm / Gowri A. S., Shanthi Bala P. -- 2. A novel resource management framework for fog computing by using machine learning algorithm / Shanthi Thangam Manukumar, Vijayalakshmi Muthuswamy -- 3. [Retracted] Security issues in fog computing for Internet of Things / D.N. Kartheek, Bharath Bhushan -- 4. Analysis of identity-based cryptography in Internet of Things (IoT) / Aravind Karrothu, Jasmine Norman -- 5. Cloud security architecture based on fully homomorphic encryption / Vaishali Ravindra Thakare, K. John Singh -- 6. Object detection in fog computing using machine learning algorithms / Peyakunta Bhargavi, Singaraju Jyothi -- 7. Distributed intelligence platform to the edge computing / Xalphonse Inbaraj -- 8. Internet of Things and fog computing applications in intelligent transportation systems / Korupalli V. Rajesh Kumar, K. Dinesh Kumar, Ravi Kumar Poluru, Syed Muzamil Basha, M. Praveen Kumar Reddy -- 9. Agribot / Ravi Kumar Poluru, M. Praveen Kumar Reddy, Rajesh Kaluri, Kuruva Lakshmanna, G. Thippa Reddy -- 10. Towards efficient resource management in fog computing : a survey and future directions / M. Sudhakara, K. Dinesh Kumar, Ravi Kumar Poluru, R. Lokesh Kumar, S. Bharath Bhushan As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems Cloud computing Cloud computing / Security measures Internet of things Goundar, Sam edt Bhushan, S. Bharath edt Rayani, Praveen Kumar edt Erscheint auch als Druck-Ausgabe, hardcover 978-1-7998-0194-8 Erscheint auch als Druck-Ausgabe, softcover 978-1-7998-0195-5 https://doi.org/10.4018/978-1-7998-0194-8 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Architecture and security issues in fog computing applications 1. Fog resource allocation through machine learning algorithm / Gowri A. S., Shanthi Bala P. -- 2. A novel resource management framework for fog computing by using machine learning algorithm / Shanthi Thangam Manukumar, Vijayalakshmi Muthuswamy -- 3. [Retracted] Security issues in fog computing for Internet of Things / D.N. Kartheek, Bharath Bhushan -- 4. Analysis of identity-based cryptography in Internet of Things (IoT) / Aravind Karrothu, Jasmine Norman -- 5. Cloud security architecture based on fully homomorphic encryption / Vaishali Ravindra Thakare, K. John Singh -- 6. Object detection in fog computing using machine learning algorithms / Peyakunta Bhargavi, Singaraju Jyothi -- 7. Distributed intelligence platform to the edge computing / Xalphonse Inbaraj -- 8. Internet of Things and fog computing applications in intelligent transportation systems / Korupalli V. Rajesh Kumar, K. Dinesh Kumar, Ravi Kumar Poluru, Syed Muzamil Basha, M. Praveen Kumar Reddy -- 9. Agribot / Ravi Kumar Poluru, M. Praveen Kumar Reddy, Rajesh Kaluri, Kuruva Lakshmanna, G. Thippa Reddy -- 10. Towards efficient resource management in fog computing : a survey and future directions / M. Sudhakara, K. Dinesh Kumar, Ravi Kumar Poluru, R. Lokesh Kumar, S. Bharath Bhushan Cloud computing Cloud computing / Security measures Internet of things |
title | Architecture and security issues in fog computing applications |
title_auth | Architecture and security issues in fog computing applications |
title_exact_search | Architecture and security issues in fog computing applications |
title_full | Architecture and security issues in fog computing applications Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani |
title_fullStr | Architecture and security issues in fog computing applications Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani |
title_full_unstemmed | Architecture and security issues in fog computing applications Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani |
title_short | Architecture and security issues in fog computing applications |
title_sort | architecture and security issues in fog computing applications |
topic | Cloud computing Cloud computing / Security measures Internet of things |
topic_facet | Cloud computing Cloud computing / Security measures Internet of things |
url | https://doi.org/10.4018/978-1-7998-0194-8 |
work_keys_str_mv | AT goundarsam architectureandsecurityissuesinfogcomputingapplications AT bhushansbharath architectureandsecurityissuesinfogcomputingapplications AT rayanipraveenkumar architectureandsecurityissuesinfogcomputingapplications |