Fog/Edge computing for security, privacy, and applications /

Saved in:
Bibliographic Details
Imprint:Cham : Springer, 2021.
Description:1 online resource (x, 418 p.) : ill. (some col.)
Language:English
Series:Advances in Information Security, 1568-2633 ; v. 83
Advances in information security ; 83.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/12610967
Hidden Bibliographic Details
Other authors / contributors:Chang, Wei, editor.
Wu, Jie, editor.
ISBN:9783030573287
3030573281
3030573273
9783030573270
9783030573294
303057329X
9783030573300
3030573303
Digital file characteristics:text file PDF
Notes:Access restricted to registered UOB users with valid accounts.
Summary:This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.
Other form:Printed edition: 9783030573270
Printed edition: 9783030573294
Printed edition: 9783030573300
Standard no.:10.1007/978-3-030-57328-7

MARC

LEADER 00000cam a2200000Ii 4500
001 12610967
005 20210813213023.0
006 m d
007 cr nn||||mamaa
008 210104s2021 sz o 000 0 eng d
019 |a 1229065872  |a 1229930969  |a 1236303048  |a 1241066121  |a 1246359310  |a 1249944651  |a 1250576132  |a 1253403519 
020 |a 9783030573287  |q (electronic bk.) 
020 |a 3030573281  |q (electronic bk.) 
020 |z 3030573273 
020 |z 9783030573270 
020 |a 9783030573294  |q (print) 
020 |a 303057329X 
020 |a 9783030573300  |q (print) 
020 |a 3030573303 
024 7 |a 10.1007/978-3-030-57328-7  |2 doi 
035 |a (OCoLC)1238203545  |z (OCoLC)1229065872  |z (OCoLC)1229930969  |z (OCoLC)1236303048  |z (OCoLC)1241066121  |z (OCoLC)1246359310  |z (OCoLC)1249944651  |z (OCoLC)1250576132  |z (OCoLC)1253403519 
035 9 |a (OCLCCM-CC)1238203545 
037 |b Springer 
040 |a DCT  |b eng  |c DCT  |d OCLCO  |d EBLCP  |d SFB  |d GW5XE  |d YDX  |d N$T  |d OCLCF  |d OCLCO  |d LEATE  |d VT2  |d LIP  |d UKAHL  |d OCL 
049 |a MAIN 
050 4 |a QA76.585 
072 7 |a UTN  |2 bicssc 
072 7 |a COM043050  |2 bisacsh 
072 7 |a UTN  |2 thema 
245 0 0 |a Fog/Edge computing for security, privacy, and applications /  |c Wei Chang, Jie Wu, editors. 
264 1 |a Cham :  |b Springer,  |c 2021. 
300 |a 1 online resource (x, 418 p.) :  |b ill. (some col.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advances in Information Security,  |x 1568-2633 ;  |v v. 83 
505 0 |a Part I: Overview of Fog/Edge Computing -- 1. "Confluence of 4G LTE, 5G, fog, and cloud computing and understanding security issues" -- 2. "An overview of the Edge Computing in Modern Digital Age" -- Part II: Security in Fog/Edge Computing -- 3. "Secure Search and Storage Services in Fog/Edge Computing" -- 4. "Collaborative Intrusion Detection Schemes in Fog-to-Things Computing" -- 5. "On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management" -- Part III: Privacy in Fog/Edge Computing.-6. "Privacy Issues in Edge Computing" -- 7. "Privacy-preserving Edge Video Analytics" -- Part IV: Architectural Design in Fog/Edge Computing -- 8. "Vulnerabilities in Fog/Edge Computing from Architectural Perspectives" -- 9. "Security and Intelligent Management for Fog/Edge Computing Resources" -- 10. "Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing" -- 11. "Blockchain-based Security Services for Fog Computing". Part V: Applications of Fog/Edge Computing -- 12. "Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions" -- 13. "Security Problems in Edge Computing and Augmented Reality" -- 14. "Towards a Security-aware Deployment of Data Streaming Applications in Fog Computing" -- 15. "Blockchain of Finite-Lifetime Blocks for Edge-IoT Applications". . 
520 |a This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein. 
506 |a Access restricted to registered UOB users with valid accounts. 
650 0 |a Cloud computing  |x Security measures. 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 0 |a Computer security.  |0 http://id.loc.gov/authorities/subjects/sh90001862 
650 0 |a Wireless communication systems.  |0 http://id.loc.gov/authorities/subjects/sh92006740 
650 0 |a Mobile communication systems.  |0 http://id.loc.gov/authorities/subjects/sh85086371 
650 0 |a Computer networks.  |0 http://id.loc.gov/authorities/subjects/sh85029513 
650 0 |a Application software.  |0 http://id.loc.gov/authorities/subjects/sh90001980 
650 7 |a Wireless communication systems.  |2 fast  |0 (OCoLC)fst01176209 
650 7 |a Mobile communication systems.  |2 fast  |0 (OCoLC)fst01024207 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer networks.  |2 fast  |0 (OCoLC)fst00872297 
650 7 |a Application software.  |2 fast  |0 (OCoLC)fst00811706 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Computer software.  |2 fast  |0 (OCoLC)fst00872527 
655 4 |a Electronic books. 
700 1 |a Chang, Wei,  |e editor. 
700 1 |a Wu, Jie,  |e editor. 
773 0 |t Springer Nature eBook  |w (OCoLC-LEATE)288477 
776 0 8 |i Printed edition:  |z 9783030573270 
776 0 8 |i Printed edition:  |z 9783030573294 
776 0 8 |i Printed edition:  |z 9783030573300 
830 0 |a Advances in information security ;  |v 83.  |x 1568-2633  |0 http://id.loc.gov/authorities/names/n00006047 
903 |a HeVa 
929 |a oclccm 
999 f f |i 2edc8658-3407-56f8-880d-ae88c4d7750a  |s 07a8a114-8c2f-51e6-89c9-d26f49a12834 
928 |t Library of Congress classification  |a QA76.585  |l Online  |c UC-FullText  |u https://link.springer.com/10.1007/978-3-030-57328-7  |z Springer Nature  |g ebooks  |i 12626575