Edge, Fog and Cloud Computing: Offering Strong Computing
Abstract
Keywords
Edgecomputing , Fog computing , Cloudcomputing , Data analysi
Kaynakça
- Tabii, işte düzeltilmiş referanslar:
- [1] M. Armbrust, et al., “A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.
- [2] H. H. Nidal and A. Khalid, “A survey of Cloud Computing Security challenges and solutions,” International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 1, pp. 52-56, 2016.
- [3] W. Shi, J. Cao, Q. Zhang, Y. Li and L. Xu, “Edge Computing: Vision and Challenges,” IEEE Internet of Things Journal, Vol. 3, No. 5, pp. 637-646, 2016.
- [4] P. Mell and T. Grance, "The NIST definition of cloud computing," National Institute of Standards and Technology, 2009, 53(6):50.
- [5] B.P. Rimal, E. Choi and I. LumbI, "A taxonomy and survey of cloud computing systems," Fifth International Joint Conference on INC, IMS and IDC, 2009, pages 44–51.
- [6] Q. Zhang, L. Cheng and R. Boutaba, "Cloud computing: state-of-the-art and research challenges," Journal of Internet Services and Applications, Vol. 1, No. 1, pp. 7–18, 2010.
- [7] S. Aldossary and W. Allen, “Data Security, Privacy, Availability, and Integrity in Cloud Computing: Issues and Current Solutions,” International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 7, No. 4, pp. 485-498, 2016.
- [8] J. Zhang, B. Chen, Y. Zhao, X. Cheng and F. Hu, “Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues,” IEEE Access, 2018, 18209-18237.
- [9] S. Khan, S. Parkinson and Y. Qin, “Fog computing security: a review of current applications and security solutions,” Journal of Cloud Computing: Advances, Systems and Applications, 2017, Article number:19.