Fog/Edge Computing For Security, Privacy, and Applications (Record no. 177176)

MARC details
000 -LEADER
fixed length control field 06025nam a22006135i 4500
001 - CONTROL NUMBER
control field 978-3-030-57328-7
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423125352.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210104s2021 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030573287
-- 978-3-030-57328-7
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-030-57328-7
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 10 - TITLE STATEMENT
Title Fog/Edge Computing For Security, Privacy, and Applications
Medium [electronic resource] /
Statement of responsibility, etc edited by Wei Chang, Jie Wu.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2021.
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2021.
300 ## - PHYSICAL DESCRIPTION
Extent X, 418 p. 112 illus., 87 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Advances in Information Security,
International Standard Serial Number 2512-2193 ;
Volume number/sequential designation 83
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part I: Overview of Fog/Edge Computing -- 1. "Confluence of 4G LTE, 5G, fog, and cloud computing and understanding security issues" -- 2. “An overview of the Edge Computing in Modern Digital Age” -- Part II: Security in Fog/Edge Computing -- 3. "Secure Search and Storage Services in Fog/Edge Computing" -- 4. “Collaborative Intrusion Detection Schemes in Fog-to-Things Computing” -- 5. “On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management” -- Part III: Privacy in Fog/Edge Computing.-6. “Privacy Issues in Edge Computing” -- 7. "Privacy-preserving Edge Video Analytics" -- Part IV: Architectural Design in Fog/Edge Computing -- 8. “Vulnerabilities in Fog/Edge Computing from Architectural Perspectives” -- 9. "Security and Intelligent Management for Fog/Edge Computing Resources" -- 10. “Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing” -- 11. “Blockchain-based Security Servicesfor Fog Computing”. Part V: Applications of Fog/Edge Computing -- 12. “Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions” -- 13. “Security Problems in Edge Computing and Augmented Reality” -- 14. “Towards a Security-aware Deployment of Data Streaming Applications in Fog Computing” -- 15. “Blockchain of Finite-Lifetime Blocks for Edge-IoT Applications”. .
520 ## - SUMMARY, ETC.
Summary, etc This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
General subdivision Law and legislation.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Wireless communication systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile communication systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks .
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Application software.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile and Network Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Privacy.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Wireless and Mobile Communication.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer and Information Systems Applications.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chang, Wei.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wu, Jie.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783030573270
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783030573294
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783030573300
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Advances in Information Security,
-- 2512-2193 ;
Volume number/sequential designation 83
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-030-57328-7">https://doi.org/10.1007/978-3-030-57328-7</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in