scholarly journals A Survey on Caching in Mobile Edge Computing

2021 ◽  
Vol 2021 ◽  
pp. 1-21
Author(s):  
Yuhan Zhao ◽  
Wei Zhang ◽  
Longquan Zhou ◽  
Wenpeng Cao

Boosted by the visions of 5G technology, along with the proliferation of IoT devices, we are lucky to bear witness of a tremendous shift within the Internet, mobile computing, and ubiquitous applications pervading people’s daily life. To catch up with the speed of this evolution, new architectures, which enable us to decentralize and focus more on the edge of the network, have to show up. To effectively address the record-breaking growth of data traffic, we also have to come up with new caching mechanisms in coping with users’ demanding QoE along with other aspects, such as data privacy and energy efficiency. In this paper, we intend to begin with reviews on edge caching. First, we make a detailed overview of mobile edge caching. Then, we move on to the QoS and QoE part, discussing the related literature concerning these topics. We then start to address factors concerning edge caching and QoE. Four cutting-edge applications utilizing these technologies with challenges posed by current network architectures are made clear. Our paper closes with some future research directions.

2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


Electronics ◽  
2018 ◽  
Vol 7 (11) ◽  
pp. 309 ◽  
Author(s):  
Hind Bangui ◽  
Said Rakrak ◽  
Said Raghay ◽  
Barbora Buhnova

Cloud computing has significantly enhanced the growth of the Internet of Things (IoT) by ensuring and supporting the Quality of Service (QoS) of IoT applications. However, cloud services are still far from IoT devices. Notably, the transmission of IoT data experiences network issues, such as high latency. In this case, the cloud platforms cannot satisfy the IoT applications that require real-time response. Yet, the location of cloud services is one of the challenges encountered in the evolution of the IoT paradigm. Recently, edge cloud computing has been proposed to bring cloud services closer to the IoT end-users, becoming a promising paradigm whose pitfalls and challenges are not yet well understood. This paper aims at presenting the leading-edge computing concerning the movement of services from centralized cloud platforms to decentralized platforms, and examines the issues and challenges introduced by these highly distributed environments, to support engineers and researchers who might benefit from this transition.


Author(s):  
Salheddine Kabou ◽  
Sidi mohamed Benslimane ◽  
Mhammed Mosteghanemi

Many organizations, especially small and medium business (SMB) enterprises require the collection and sharing of data containing personal information. The privacy of this data must be preserved before outsourcing to the commercial public. Privacy preserving data publishing PPDP refers to the process of publishing useful information while preserving data privacy. A variety of approaches have been proposed to ensure privacy by applying traditional anonymization models which focused only on the single publication of datasets. In practical applications, data publishing is more complicated where the organizations publish multiple times for different recipients or after modifications to provide up-to-date data. Privacy preserving dynamic data publication PPDDP is a new process in privacy preservation which addresses the anonymization of the data for different purposes. In this survey, the author will systematically evaluate and summarize different studies to PPDDP, clarify the differences and requirements between the scenarios that can exist, and propose future research directions.


2021 ◽  
Vol 36 ◽  
pp. 04005
Author(s):  
Kah Meng Chong

Electronic Health Record (EHR) is the key to an efficient healthcare service delivery system. The publication of healthcare data is highly beneficial to healthcare industries and government institutions to support a variety of medical and census research. However, healthcare data contains sensitive information of patients and the publication of such data could lead to unintended privacy disclosures. In this paper, we present a comprehensive survey of the state-of-the-art privacy-enhancing methods that ensure a secure healthcare data sharing environment. We focus on the recently proposed schemes based on data anonymization and differential privacy approaches in the protection of healthcare data privacy. We highlight the strengths and limitations of the two approaches and discussed some promising future research directions in this area.


Author(s):  
Vighnesh Srinivasa Balaji

In recent times, the number of internet of things (IoT) devices/sensors increased tremendously. To support the computational demand of real-time latency-sensitive applications of largely geo-distributed IoT devices/sensors, a new computing paradigm named fog computing has been introduced. In this chapter, the authors will introduce fog computing, its difference in comparison to cloud computing, and issues related to fog. Among the three issues (i.e. service, structural, and security issues), this chapter scrutinizes and comprehensively discusses the service and structural issues also providing the service level objectives of the fog. They next provide various algorithms for computing in fog, the challenges faced, and future research directions. Among the various uses of fog, two scenarios are put to use.


Author(s):  
Muhammad Nawaz Brohi

present, we are in the world of digital revolution. Use of smartphones and internet accelerated due to the impact of the novel Covid-19 virus. The whole world started to turn digital. The industrialization of Internet of Things (IoT) enables more devices to connect and communicate which leads to many data transfer transactions. The architecture of IoT is centralized. The distributed and decentralized architecture of Blockchain can be used to provide secure and scalable transactions of IoT devices. Blockchain is a distributed ledger technology, which provides secure data transactions that cannot be tampered and altered. In this paper, we provide advantages and challenges of integrating IoT and Blockchain. We also provide different architectures and algorithms proposed by researchers to provide secure data transactions.  We shall also shed light on the future research directions of integrating Blockchain and IoT.


2021 ◽  
Vol 11 (12) ◽  
pp. 5713
Author(s):  
Majda Wazzan ◽  
Daniyal Algazzawi ◽  
Omaima Bamasaq ◽  
Aiiad Albeshri ◽  
Li Cheng

Internet of Things (IoT) is promising technology that brings tremendous benefits if used optimally. At the same time, it has resulted in an increase in cybersecurity risks due to the lack of security for IoT devices. IoT botnets, for instance, have become a critical threat; however, systematic and comprehensive studies analyzing the importance of botnet detection methods are limited in the IoT environment. Thus, this study aimed to identify, assess and provide a thoroughly review of experimental works on the research relevant to the detection of IoT botnets. To accomplish this goal, a systematic literature review (SLR), an effective method, was applied for gathering and critically reviewing research papers. This work employed three research questions on the detection methods used to detect IoT botnets, the botnet phases and the different malicious activity scenarios. The authors analyzed the nominated research and the key methods related to them. The detection methods have been classified based on the techniques used, and the authors investigated the botnet phases during which detection is accomplished. This research procedure was used to create a source of foundational knowledge of IoT botnet detection methods. As a result of this study, the authors analyzed the current research gaps and suggest future research directions.


2021 ◽  
Vol 54 (6) ◽  
pp. 1-36
Author(s):  
Xuefei Yin ◽  
Yanming Zhu ◽  
Jiankun Hu

The past four years have witnessed the rapid development of federated learning (FL). However, new privacy concerns have also emerged during the aggregation of the distributed intermediate results. The emerging privacy-preserving FL (PPFL) has been heralded as a solution to generic privacy-preserving machine learning. However, the challenge of protecting data privacy while maintaining the data utility through machine learning still remains. In this article, we present a comprehensive and systematic survey on the PPFL based on our proposed 5W-scenario-based taxonomy. We analyze the privacy leakage risks in the FL from five aspects, summarize existing methods, and identify future research directions.


2021 ◽  
Author(s):  
Quynh Ngo ◽  
Tran Khoa Phan ◽  
Wei Xiang ◽  
Abdun Mahmood ◽  
Jill Slay

<div>The implementation of the Internet of Things (IoT) is mostly done through cellular networks which do not cover the whole world. In addition, the explosive growth of global Internet access demand introduces the need for integrating satellites with cellular IoT networks for coverage extension and backhaul offloading. Operating hybrid satellite-IoT (SIoT) networks, however, might incur excessive service latency and high satellite bandwidth consumption. To tackle these issues, edge caching technology has been considered in SIoT. This article reviews existing research on edge caching-based SIoT networks with illustrative performance evaluation. Various caching design criteria with a focus on two-tier cache-enabled SIoT are discussed. In addition, open research problems on edge caching in SIoT are identified as future research directions and opportunities.</div>


Sign in / Sign up

Export Citation Format

Share Document