Architecture and security issues in fog computing applications

As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the l...

Full description

Bibliographic Details
Other Authors: Goundar, Sam, 1967-, Bhushan, S. Bharath, 1990-, Rayani, Praveen Kumar, 1989-
Format: eBook
Language:English
Published: Hershey PA Engineering Science Reference, an imprint of IGI Global, [2020]
Series:Advances in computer and electrical engineering (ACEE) book series.
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 04661cam a2200517Ii 4500
001 koha001014207
003 OCoLC
005 20250222070027.0
006 m d
007 cr |||||||||||
008 190904t20202020paua ob 001 0 eng d
035 |a koha001014207 
040 |a IGIGL  |b eng  |e pn  |e rda  |c IGIGL  |d OCLCO  |d OCLCF  |d YDXIT  |d WAU  |d YDX  |d N$T 
020 |a 1799801969  |q (electronic book) 
020 |a 9781799801962  |q (electronic bk.) 
020 |z 9781799801948  |q (hardcover) 
020 |z 9781799801955  |q (paperback) 
024 7 |a 10.4018/978-1-7998-0194-8  |2 doi 
050 4 |a QA76.585  |b .A73 2020 
082 0 4 |a 004.67/82  |2 23 
049 |a MAIN 
245 0 0 |a Architecture and security issues in fog computing applications  |c [edited by] Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani. 
264 1 |a Hershey PA  |b Engineering Science Reference, an imprint of IGI Global,  |c [2020] 
300 |a 1 online resource (205 pages)  |b illustrations. 
490 1 |a Advances in computer and electrical engineering (ACEE) Book series,  |x 2327-0403 
504 |a Includes bibliographical references and index. 
505 0 |a 1. Fog resource allocation through machine learning algorithm / Gowri A. S., Shanthi Bala P. -- 2. A novel resource management framework for fog computing by using machine learning algorithm / Shanthi Thangam Manukumar, Vijayalakshmi Muthuswamy -- 3. [Retracted] Security issues in fog computing for Internet of Things / D.N. Kartheek, Bharath Bhushan -- 4. Analysis of identity-based cryptography in Internet of Things (IoT) / Aravind Karrothu, Jasmine Norman -- 5. Cloud security architecture based on fully homomorphic encryption / Vaishali Ravindra Thakare, K. John Singh -- 6. Object detection in fog computing using machine learning algorithms / Peyakunta Bhargavi, Singaraju Jyothi -- 7. Distributed intelligence platform to the edge computing / Xalphonse Inbaraj -- 8. Internet of Things and fog computing applications in intelligent transportation systems / Korupalli V. Rajesh Kumar, K. Dinesh Kumar, Ravi Kumar Poluru, Syed Muzamil Basha, M. Praveen Kumar Reddy -- 9. Agribot / Ravi Kumar Poluru, M. Praveen Kumar Reddy, Rajesh Kaluri, Kuruva Lakshmanna, G. Thippa Reddy -- 10. Towards efficient resource management in fog computing : a survey and future directions / M. Sudhakara, K. Dinesh Kumar, Ravi Kumar Poluru, R. Lokesh Kumar, S. Bharath Bhushan. 
520 |a As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems. 
588 0 |a Print version record. 
653 0 |a Cloud computing. 
653 0 |a Cloud computing  |x Security measures. 
653 0 |a Internet of things. 
653 7 |a Cloud computing.  |2 fast  |0 (OCoLC)fst01745899 
653 7 |a Internet of things.  |2 fast  |0 (OCoLC)fst01894151 
655 0 |a EBSCO eBooks  |9 905790 
655 4 |a Electronic books.  |9 899821 
700 1 |a Goundar, Sam,  |d 1967-  |9 913295 
700 1 |a Bhushan, S. Bharath,  |d 1990-  |9 913296 
700 1 |a Rayani, Praveen Kumar,  |d 1989-  |9 913297 
710 2 |a IGI Global,  |e publisher.  |9 899844 
830 0 |a Advances in computer and electrical engineering (ACEE) book series.  |9 902177 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/2239359.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1014207 
910 |a EBSCO eBooks 
999 |c 1014207  |d 1014207 
039