Article
Automation & Control Systems
Ying Gao, Yijian Chen, Xiping Hu, Hongliang Lin, Yangliang Liu, Laisen Nie
Summary: Pervasive edge computing and software-defined networks support the industrial Internet of Things, but face challenges in data security and privacy. By utilizing blockchain and proxy reencryption technologies, these issues can be addressed while enhancing device credibility and authenticity.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Information Systems
Xinghua Li, Lizhong Bai, Yinbin Miao, Siqi Ma, Jianfeng Ma, Ximeng Liu, Kim-Kwang Raymond Choo
Summary: With the rise in popularity of location-based services, spatial keyword queries have become an important application. To address the issues of privacy leakage and network bandwidth overheads, we propose PSKF, a Privacy-preserving top-k Spatial Keyword query system based on Fog computing. By utilizing IR-tree and distributing subtrees among fog servers, we achieve efficient search and improve search efficiency. Formal security analysis shows that our proposed PSKF scheme achieves Indistinguishability under Known-Plaintext Attacks (IND-KPA), and extensive experiments demonstrate its efficiency and feasibility in practical applications.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2023)
Article
Computer Science, Theory & Methods
Jie Cui, Bei Li, Hong Zhong, Geyong Min, Yan Xu, Lu Liu
Summary: This article presents a bidirectional fine-grained access control scheme for cloud data sharing, which can restrict the capabilities of both senders and receivers. By combining the cloud side and the edge side in a data sharing framework, and utilizing attribute-based encryption and proxy re-encryption algorithms, efficient access control is achieved.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
(2022)
Article
Computer Science, Information Systems
Zhipeng Cai, Tuo Shi
Summary: This article investigates query processing in an edge-assisted IoT data monitoring system (EDMS), proposing an approximation algorithm and evaluating its performance through extensive simulations.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Changhee Hahn, Jongkil Kim
Summary: This article investigates two state-of-the-art schemes for verifiable outsourced decryption of encrypted data and identifies their vulnerabilities. It then proposes a securitywise enhanced encoding scheme and conducts a rigorous security analysis. Experimental results show that the proposed method outperforms the other two schemes in terms of encoding computation cost.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Theory & Methods
Shivananda R. Poojara, Chinmaya Kumar Dehury, Pelle Jakovits, Satish Narayana Srirama
Summary: With the growth of IoT devices, the need for efficient data processing and analytics is increasing. This study explores the benefits of using Serverless data pipelines for IoT data analytics and evaluates different approaches for designing such pipelines. The results reveal the suitability of different design methods for different types of applications.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2022)
Article
Telecommunications
Shakoor Vakilian, Ali Fanian, Naghmeh Sadat Moayedian, T. Aaron Gulliver
Summary: As a new paradigm, smart cities face challenges such as processing huge volumes of data within limited time constraints. To tackle this, fog computing is introduced, enabling cooperation between servers from the network edge to the cloud. Although it reduces response time, it also increases data volume in the fog layer and thus energy costs. To address this, a convex problem is introduced and solved using a Lagrangian Cooperation algorithm, which outperforms existing approaches.
IEEE COMMUNICATIONS LETTERS
(2022)
Article
Computer Science, Information Systems
Indranil Sarkar, Mainak Adhikari, Neeraj Kumar, Sanjay Kumar
Summary: This study analyzes the offloading strategy in a hierarchical fog-cloud network, considering the scenario where fog devices have different CPU frequencies and power consumption. The total system cost is formulated as a mixed-integer nonlinear problem, aiming to reduce delay in the network. The problem is transformed into a QCQP and solved using the SDR method. Simulation results show that the proposed strategy outperforms baseline algorithms in various aspects.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Yu Guo, Hongcheng Xie, Cong Wang, Xiaohua Jia
Summary: This article presents a geographic range-match scheme for fog-enhanced services that securely collects sensed data while protecting the location privacy of IoT devices. By formulating the problem as range-based pattern matching and designing security schemes in the ciphertext domain, efficient range queries can be performed with reduced accessible information.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Information Systems
Yong Xiao, Marwan Krunz
Summary: This paper presents a measurement study of wireless access latency between connected vehicles and a fog/cloud computing system supported by LTE networks. It introduces AdaptiveFog, a framework for autonomous and dynamic switching between different LTE networks, aiming to maximize the confidence level of service latency. The paper proposes a novel statistical distance metric and evaluates the performance gap between LTE networks. Extensive analysis and simulations show that AdaptiveFog significantly improves the confidence levels of fog and cloud latencies.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Computer Science, Information Systems
Jingwei Liu, Yating Li, Rong Sun, Qingqi Pei, Ning Zhang, Mianxiong Dong, Victor C. M. Leung
Summary: Cloud storage and edge computing can address the storage and computing pressure caused by the growth of edge network traffic. This paper proposes a novel multikeyword attribute-based searchable encryption (EMK-ABSE) scheme that achieves efficient and secure search of encrypted data through cloud-edge coordination.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Quy Vu Khanh, Nam Vi Hoai, Anh Dang Van, Quy Nguyen Minh
Summary: History has shown that healthcare and medical systems are crucial for the advancement of science and technology. In the past decades, there has been an explosive growth of ehealth applications, with cloud computing dominating e-healthcare systems and various domains. However, the high response time of cloud-based e-health systems presents a primary barrier.
INTERNET OF THINGS
(2023)
Article
Computer Science, Hardware & Architecture
Claudio Correia, Miguel Correia, Luis Rodrigues
Summary: This article presents the design and implementation of a secure event ordering service for fog nodes. The service leverages a Trusted Execution Environment (TEE) to provide guarantees regarding the order of events, even when fog nodes are compromised.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Review
Computer Science, Interdisciplinary Applications
Rohit Kumar, Neha Agrawal
Summary: Cloud computing is transforming traditional computing methods through various forms and architectural types, such as Edge and Fog computing. These extensions of the basic cloud computing model promise improved network performance. Industrial applications rely on cloud resources to process a large volume of power-sensitive Industrial IoT (IIoT) data, which requires careful analysis to enhance system performance. This paper explores the Edge-Fog-Cloud architectural frameworks, compares their advantages and disadvantages, and delves into the scientific side of multi-dimensional IIoT data. It also highlights the current state-of-the-art and implementation challenges.
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION
(2023)
Article
Computer Science, Information Systems
Ismael Martinez, Abdelhakim Senhaji Hafid, Abdallah Jarray
Summary: The increasing demand for Internet-of-Things applications has led to an overreliance on cloud computing, resulting in network congestion and unreliable response delays. Fog computing, as an alternative to cloud, offers low-latency services by bringing processing and storage resources to the network edge.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Artificial Intelligence
Yuantao Chen, Linwu Liu, Volachith Phonevilay, Ke Gu, Runlong Xia, Jingbo Xie, Qian Zhang, Kai Yang
Summary: This paper proposed an image super-resolution reconstruction method using attention mechanism with feature map to improve the visual effect of images and enhance the evaluation indicators. The proposed model consists of feature extraction block, information extraction block, and reconstruction module, which effectively restores more details in high-resolution images.
APPLIED INTELLIGENCE
(2021)
Article
Computer Science, Theory & Methods
Zhuoqun Xia, Jingjing Tan, Ke Gu, WeiJia Jia
Summary: This paper proposes a resource allocation scheme for two-layer collaborative IDSs in smart grids, quantifying the impact of detection resource restriction through a stochastic game model and proposing an optimized resource allocation method.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2021)
Article
Green & Sustainable Science & Technology
Lulu Yang, Xu Xiao, Ke Gu
Summary: This paper proposes an agricultural-waste-recycling model for Chinese family farms based on the extended MFCA. Through research on family farms in Hunan Province, the agricultural-waste-recycling model was optimized and subjected to a two-dimensional analysis. The study shows that visualizing the monetization of resource losses can optimize manure recycling through better decision-making, thereby increasing the sustainability of family farms.
Article
Geochemistry & Geophysics
Xiang Li, Jingyu Deng, Yi Fang
Summary: In this article, a metalearning-based method for few-shot object detection on remote sensing images is introduced. Experimental results on benchmark datasets demonstrate that the proposed method achieves satisfying detection performance with only a few annotated samples and outperforms existing baseline models.
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
(2022)
Article
Computer Science, Information Systems
Xiong Li, Shanpeng Liu, Rongxing Lu, Muhammad Khurram Khan, Ke Gu, Xiaosong Zhang
Summary: This study proposes an efficient privacy-preserving public auditing protocol to address the integrity of medical data in cloud-based medical storage systems. The research shows that the protocol significantly reduces computational costs for both data owners and third-party auditors, while improving communication efficiency.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS
(2022)
Article
Engineering, Multidisciplinary
Ke Gu, XinYing Dong, Xiong Li, WeiJia Jia
Summary: This paper proposes a detection scheme for malicious nodes in fog computing-based VANETs, which can supervise the data forwarding process and detect malicious nodes in a timely manner. The experimental results demonstrate the effectiveness of the proposed scheme in ensuring security.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2022)
Article
Computer Science, Information Systems
Zhuoqun Xia, Lingxuan Zeng, Ke Gu, Xiong Li, Weijia Jia
Summary: This article proposes an efficient conditional identity privacy-preserving authentication scheme based on the cooperation of multiple fog servers in fog computing-based Internet of Vehicles (IoVs). This scheme solves the issues of information leakage and security in IoVs. Experimental results demonstrate the high efficiency of our scheme in fog computing-based IoVs.
ACM TRANSACTIONS ON INTERNET TECHNOLOGY
(2022)
Article
Computer Science, Artificial Intelligence
Zhuoqun Xia, Yaling Chen, Bo Yin, Haolan Liang, Hongmei Zhou, Ke Gu, Fei Yu
Summary: This paper proposes an efficient intrusion detection framework Fed_ADBN based on federated attention deep belief network and client selection. It not only protects data security but also accurately detects network attacks in AMI network using a combination of federated learning and attention mechanism.
Article
Computer Science, Information Systems
Ke Gu, Wenbin Zhang, Xiong Li, Weijia Jia
Summary: This paper proposes a self-verifiable attribute-based keyword search scheme for distributed data storage in a full fog computing environment. The scheme provides attribute-based distributed data storage among fog servers through a threshold secret-sharing scheme and offers self-verifiable keyword search and data decryption for terminal users.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2022)
Article
Engineering, Civil
Ke Gu, Keming Wang, Xiong Li, Weijia Jia
Summary: The paper proposes a decentralized traceable privacy-preserving scheme for vehicular identity in fog computing-based Internet of Vehicles (IoV), which uses multiple fog servers to trace the identity and trajectory of a vehicle under certain conditions. By utilizing a secret sharing scheme, the true identity of a vehicle is hidden and traced, ensuring security requirements are met and data collection procedure is secure under the real-or-random model. Experimental results show the efficiency of the proposed scheme in IoV.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2022)
Article
Computer Science, Hardware & Architecture
Fan Wu, Xiong Li, Xiangyang Luo, Ke Gu
Summary: This paper investigates the authentication issue of smart vehicles in edge computing-enabled Internet of Vehicles with drone assistance. A scheme is proposed and proven to be secure and practical through formal proof and network simulation.
JOURNAL OF SYSTEMS ARCHITECTURE
(2022)
Article
Computer Science, Information Systems
Zhuoqun Xia, Xiaoxiao Mao, Ke Gu, Weijia Jia
Summary: This paper proposes a dual-mode data forwarding scheme based on interest tags for fog computing-based SIoVs, aiming to address the issues of data forwarding optimization and adaptability in dynamic networks. The experimental results show that the proposed scheme is more efficient and stable than other related schemes.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2022)
Article
Computer Science, Cybernetics
Zhuoqun Xia, Xiaoxiao Mao, Ke Gu, Weijia Jia
Summary: This article introduces a data-forwarding incentive scheme based on 2-D behavior markers to encourage vehicle nodes to participate in data forwarding, improving data delivery ratio. By evaluating the behaviors of vehicle nodes comprehensively, cooperation between selfish nodes in data forwarding is promoted.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS
(2022)
Article
Engineering, Civil
Ke Gu, Jieyu Hu, Weijia Jia
Summary: This paper proposes an adaptive area-based traffic congestion control and management scheme based on fog computing and the internet of vehicles. It effectively guides traffic flow to alleviate congestion through cooperation in controlling traffic lights.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Telecommunications
Zhuoqun Xia, Yichao Zhang, Ke Gu, Xiong Li, Weijia Jia
Summary: This paper proposes a multi-dimensional and multi-angle electricity data aggregation scheme for a fog computing-based smart metering system. The scheme utilizes super-incremental sequence matrix and homomorphic Paillier cryptosystem to structure, encrypt, and aggregate electricity consumption data, ensuring privacy protection and meeting the requirements of fine-grained analysis.
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING
(2022)