001434205 000__ 06365cam\a2200745\i\4500 001434205 001__ 1434205 001434205 003__ OCoLC 001434205 005__ 20230309003716.0 001434205 006__ m\\\\\o\\d\\\\\\\\ 001434205 007__ cr\nn\nnnunnun 001434205 008__ 210104s2021\\\\sz\a\\\\o\\\\\000\0\eng\d 001434205 019__ $$a1229065872$$a1229930969$$a1236303048$$a1241066121$$a1246359310$$a1249944651$$a1250576132$$a1253403519 001434205 020__ $$a9783030573287$$q(electronic bk.) 001434205 020__ $$a3030573281$$q(electronic bk.) 001434205 020__ $$a9783030573294$$q(print) 001434205 020__ $$a303057329X 001434205 020__ $$a9783030573300$$q(print) 001434205 020__ $$a3030573303 001434205 020__ $$z3030573273 001434205 020__ $$z9783030573270 001434205 0247_ $$a10.1007/978-3-030-57328-7$$2doi 001434205 035__ $$aSP(OCoLC)1238203545 001434205 040__ $$aDCT$$beng$$epn$$cDCT$$dOCLCO$$dEBLCP$$dSFB$$dGW5XE$$dYDX$$dN$T$$dOCLCF$$dOCLCO$$dLEATE$$dVT2$$dLIP$$dUKAHL$$dOCL$$dOCLCQ$$dOCLCO$$dOCLCQ 001434205 049__ $$aISEA 001434205 050_4 $$aQA76.585 001434205 08204 $$a005.8$$223 001434205 24500 $$aFog/Edge computing for security, privacy, and applications /$$cWei Chang, Jie Wu, editors. 001434205 264_1 $$aCham :$$bSpringer,$$c2021. 001434205 300__ $$a1 online resource (x, 418 pages) :$$billustrations (some color) 001434205 336__ $$atext$$btxt$$2rdacontent 001434205 337__ $$acomputer$$bc$$2rdamedia 001434205 338__ $$aonline resource$$bcr$$2rdacarrier 001434205 347__ $$atext file 001434205 347__ $$bPDF 001434205 4901_ $$aAdvances in Information Security,$$x1568-2633 ;$$vv. 83 001434205 5050_ $$aPart I: Overview of Fog/Edge Computing -- 1. "Confluence of 4G LTE, 5G, fog, and cloud computing and understanding security issues" -- 2. "An overview of the Edge Computing in Modern Digital Age" -- Part II: Security in Fog/Edge Computing -- 3. "Secure Search and Storage Services in Fog/Edge Computing" -- 4. "Collaborative Intrusion Detection Schemes in Fog-to-Things Computing" -- 5. "On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management" -- Part III: Privacy in Fog/Edge Computing.-6. "Privacy Issues in Edge Computing" -- 7. "Privacy-preserving Edge Video Analytics" -- Part IV: Architectural Design in Fog/Edge Computing -- 8. "Vulnerabilities in Fog/Edge Computing from Architectural Perspectives" -- 9. "Security and Intelligent Management for Fog/Edge Computing Resources" -- 10. "Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing" -- 11. "Blockchain-based Security Services for Fog Computing". Part V: Applications of Fog/Edge Computing -- 12. "Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions" -- 13. "Security Problems in Edge Computing and Augmented Reality" -- 14. "Towards a Security-aware Deployment of Data Streaming Applications in Fog Computing" -- 15. "Blockchain of Finite-Lifetime Blocks for Edge-IoT Applications." 001434205 506__ $$aAccess limited to authorized users. 001434205 520__ $$aThis book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein. 001434205 650_0 $$aCloud computing$$xSecurity measures. 001434205 650_0 $$aComputer networks$$xSecurity measures. 001434205 650_0 $$aComputer security. 001434205 650_0 $$aWireless communication systems. 001434205 650_0 $$aMobile communication systems. 001434205 650_0 $$aComputer networks. 001434205 650_0 $$aApplication software. 001434205 650_6 $$aInfonuagique$$xSécurité$$xMesures. 001434205 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures. 001434205 650_6 $$aSécurité informatique. 001434205 650_6 $$aTransmission sans fil. 001434205 650_6 $$aRadiocommunications mobiles. 001434205 650_6 $$aRéseaux d'ordinateurs. 001434205 650_6 $$aLogiciels d'application. 001434205 655_0 $$aElectronic books. 001434205 7001_ $$aChang, Wei,$$eeditor. 001434205 7001_ $$aWu, Jie,$$eeditor. 001434205 77608 $$iPrint version: $$z9783030573270 001434205 77608 $$iPrint version: $$z9783030573294 001434205 77608 $$iPrint version: $$z9783030573300 001434205 830_0 $$aAdvances in information security ;$$v83.$$x1568-2633 001434205 852__ $$bebk 001434205 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-57328-7$$zOnline Access$$91397441.1 001434205 909CO $$ooai:library.usi.edu:1434205$$pGLOBAL_SET 001434205 980__ $$aBIB 001434205 980__ $$aEBOOK 001434205 982__ $$aEbook 001434205 983__ $$aOnline 001434205 994__ $$a92$$bISE