File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: A Survey on Access Control in Fog Computing

TitleA Survey on Access Control in Fog Computing
Authors
Issue Date2018
Citation
IEEE Communications Magazine, 2018, v. 56, n. 2, p. 144-149 How to Cite?
Abstract© 1979-2012 IEEE. Fog computing has emerged as an attractive solution to the distributed application of the Internet of Things, and could provide low-latency, highly mobile, and geo-distributed services distinguished from the cloud. While fog computing offers numerous benefits, it also faces various security challenges, of which access control is one of the fundamental requirements since it is concerned with authorizing users to access resources in the open fog environment. This article provides a comprehensive survey of access control of users' data in the environment of fog computing with the aim of highlighting security problems and challenges. It discusses the definition, architecture, and characteristics of fog computing, based on which typical requirements and essential models of access control are addressed. Finally, it highlights known access control schemes in the environment of fog computing, and identifies existing unresolved problems as future directions.
Persistent Identifierhttp://hdl.handle.net/10722/280653
ISSN
2023 Impact Factor: 8.3
2023 SCImago Journal Rankings: 5.631
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorZhang, Peng-
dc.contributor.authorLiu, Joseph K.-
dc.contributor.authorRichard Yu, F.-
dc.contributor.authorSookhak, Mehdi-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorLuo, Xiapu-
dc.date.accessioned2020-02-17T14:34:35Z-
dc.date.available2020-02-17T14:34:35Z-
dc.date.issued2018-
dc.identifier.citationIEEE Communications Magazine, 2018, v. 56, n. 2, p. 144-149-
dc.identifier.issn0163-6804-
dc.identifier.urihttp://hdl.handle.net/10722/280653-
dc.description.abstract© 1979-2012 IEEE. Fog computing has emerged as an attractive solution to the distributed application of the Internet of Things, and could provide low-latency, highly mobile, and geo-distributed services distinguished from the cloud. While fog computing offers numerous benefits, it also faces various security challenges, of which access control is one of the fundamental requirements since it is concerned with authorizing users to access resources in the open fog environment. This article provides a comprehensive survey of access control of users' data in the environment of fog computing with the aim of highlighting security problems and challenges. It discusses the definition, architecture, and characteristics of fog computing, based on which typical requirements and essential models of access control are addressed. Finally, it highlights known access control schemes in the environment of fog computing, and identifies existing unresolved problems as future directions.-
dc.languageeng-
dc.relation.ispartofIEEE Communications Magazine-
dc.titleA Survey on Access Control in Fog Computing-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/MCOM.2018.1700333-
dc.identifier.scopuseid_2-s2.0-85042196401-
dc.identifier.volume56-
dc.identifier.issue2-
dc.identifier.spage144-
dc.identifier.epage149-
dc.identifier.isiWOS:000425606900021-
dc.identifier.issnl0163-6804-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats