1,372 research outputs found

    Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities

    Get PDF
    Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Many researchers have reviewed security and privacy issues in edge computing, but not all have fully investigated the security and privacy requirements. Security and privacy requirements are the objectives that indicate the capabilities as well as functions a system performs in eliminating certain security and privacy vulnerabilities. The paper aims to substantially review the security and privacy requirements of the edge computing and the various technological methods employed by the techniques used in curbing the threats, with the aim of helping future researchers in identifying research opportunities. This paper investigate the current studies and highlights the following: (1) the classification of security and privacy requirements in edge computing, (2) the state of the art techniques deployed in curbing the security and privacy threats, (3) the trends of technological methods employed by the techniques, (4) the metrics used for evaluating the performance of the techniques, (5) the taxonomy of attacks affecting the edge network, and the corresponding technological trend employed in mitigating the attacks, and, (6) research opportunities for future researchers in the area of edge computing security and privacy

    A bibliography experiment on research within the scope of industry 4.0 application areas in sports: Sporda endüstri 4.0 uygulama alanları kapsamında yapılan araştırmalar üzerine bir bibliyografya denemesi

    Get PDF
    Developed countries develop their production sites within the scope of industry 4.0 technology components and experience constant change and transformation to establish economic superiority. This situation allows them to produce more in various fields and thus to rise to a more advantageous position economically. Industry 4.0 technology affects areas within the scope of the sports industry such as sports tourism, athlete performance, athlete health, sports publishing, sports textile products, sports education and training, sports management and human resources, and creates an international competition environment in terms of production and performance. In this study, it is aimed to examine the researches about the usage areas of industry 4.0 in sports. From this point on, researches in the context of the subject have been presented with bibliographic method. In the conclusion section, the weaknesses and possibilities of youth sociology were discussed, and efforts were made to present a projection on what to do about the field. In this respect, a youth sociology evaluation has been tried to be made on the prominent topics, forgotten aspects and themes left incomplete in youth sociology studies. ​Extended English summary is in the end of Full Text PDF (TURKISH) file.   Özet Gelişmiş ülkeler endüstri 4.0 teknolojisi bileşenleri kapsamında üretim sahalarını geliştirmekte ve ekonomik üstünlük kurmak amacıyla sürekli değişim ve dönüşüm yaşamaktadır. Bu durum onların çeşitli alanlarda daha fazla üretmelerine dolayısıyla ekonomik yönden daha avantajlı konuma yükselmelerine olanak sağlamaktadır. Endüstri 4.0 teknolojisi spor turizmi, sporcu performansı, sporcu sağlığı, spor yayıncılığı, spor tekstil ürünleri, spor eğitimi ve öğretimi, spor yönetimi ve insan kaynakları gibi spor endüstrisi kapsamındaki alanları etkilemekte üretim ve performans yönünden ülkeler arası bir rekabet ortamı oluşturmaktadır. Bu çalışmada endüstri 4.0’ın sporda kullanım alanları ile ilgili araştırmaların incelenmesi hedeflenmektedir. Bu noktadan hareketle konu bağlamındaki araştırmalar bibliyografik metodla ortaya konmuştur. Sonuç bölümünde ise sporda endüstri 4.0 kullanım alanları tartışılmış, alana olan katkıları ve olumuz etkilerinin değerlendirilmesi yapılmıştır. &nbsp

    AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications

    Get PDF
    Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in previous approaches, we assume an individual wireless node is vulnerable. We present an agent-based architecture with supporting services that is proven to be adequate to detect and confine common attacks. Decisions at different levels are supported by a trust-based framework with good and bad reputation feedback while maintaining resistance to bad-mouthing attacks. We also propose a set of services that can be used to handle identification, authentication, and authorization in intelligent ambients. The resulting approach takes into account practical issues, such as resource limitation, bandwidth optimization, and scalability

    Mobile IP: state of the art report

    Get PDF
    Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node. Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working group, that is able to inform the network about this change in network attachment such that the Internet data packets will be delivered in a seamless way to the new point of attachment. This document presents current developments and research activities in the Mobile IP area

    The Data of Things: Strategies, Patterns and Practice of Cloud-based Participatory Sensing

    Get PDF
    The broad capabilities of current mobile devices have paved the way for Mobile Crowd Sensing (MCS) applications. The success of this emerging paradigm strongly depends on the quality of received data which, in turn, is contingent to mass user participation; the broader the participation, the more useful these systems become. However, there is an ongoing trend that tries to integrate MCS applications with emerging computing paradigms such as cloud computing. The intuition is that such a transition can significantly improve the overall efficiency while at the same time it offers stronger security and privacy-preserving mechanisms for the end-user. In this position paper, we dwell on the underpinnings of incorporating cloud computing techniques to facilitate the vast amount of data collected in MCS applications. That is, we present a list of core system, security and privacy requirements that must be met if such a transition is to be successful. To this end, we first address several competing challenges not previously considered in the literature such as the scarce energy resources of battery-powered mobile devices as well as their limited computational resources that they often prevent the use of computationally heavy cryptographic operations and thus offering limited security services to the end-user. Finally, we present a use case scenario as a comprehensive example. Based on our findings, we posit open issues and challenges, and discuss possible ways to address them, so that security and privacy do not hinder the migration of MCS systems to the cloud

    Second annual progress report

    Get PDF

    Mobile Cloud Computing Model and Big Data Analysis for Healthcare Applications

    Get PDF
    Mobile devices are increasingly becoming an indispensable part of people\u27s daily life, facilitating to perform a variety of useful tasks. Mobile cloud computing integrates mobile and cloud computing to expand their capabilities and benefits and overcomes their limitations, such as limited memory, CPU power, and battery life. Big data analytics technologies enable extracting value from data having four Vs: volume, variety, velocity, and veracity. This paper discusses networked healthcare and the role of mobile cloud computing and big data analytics in its enablement. The motivation and development of networked healthcare applications and systems is presented along with the adoption of cloud computing in healthcare. A cloudlet-based mobile cloud-computing infrastructure to be used for healthcare big data applications is described. The techniques, tools, and applications of big data analytics are reviewed. Conclusions are drawn concerning the design of networked healthcare systems using big data and mobile cloud-computing technologies. An outlook on networked healthcare is given
    corecore