198
Views
1
CrossRef citations to date
0
Altmetric
Computers and Computing

Financial Data Security Management Method and Edge Computing Platform Based on Intelligent Edge Computing and Big Data

References

  • X. Chen, L. Jiao, W. Li, et al., “Efficient multi-user computation offloading for mobile-edge cloud computing,” IEEE ACM Trans. Netw., Vol. 24, no. 5, pp. 2795–2808, 2016.
  • W. Shi, J. Cao, Q. Zhang, et al., “Edge computing: vision and challenges,” Internet Things J., Vol. 3, no. 5, pp. 637–646, 2016.
  • M. G. R. Alam, M. S. Munir, M. Z. Uddin, et al., “Edge-of-things computing framework for cost-effective provisioning of healthcare data,” J. Parallel. Distrib. Comput., Vol. 123, pp. 54–60, 2018.
  • P. G. Lopez, A. Montresor, D. Epema, et al., “Edge-centric computing: vision and challenges,” Comput. Commun. Rev., Vol. 45, no. 5, pp. 37–42, 2015.
  • V. Pande, C. Marlecha, and S. Kayte, “A review-fog computing and its role in the internet of things,” Int. J. Eng. Res. Appl., Vol. 6, no. 10, pp. 2248–96227, 2016.
  • M. Satyanarayanan, P. Simoens, Y. Xiao, et al., “Edge analytics in the internet of things,” IEEE Pervas. Comput., Vol. 14, no. 2, pp. 24–31, 2015.
  • R. Roman, J. Lopez, and M. Mambo, “Mobile edge computing: a survey and analysis of security threats and challenges,” Future Gener. Comput. Syst., Vol. 78, no. 2, pp. 680–698, 2016.
  • D. L. Miller, and J. F. Pekny, “A staged primal-dual algorithm for perfect b-matching with edge capacities,” INFORMS J. Comput., Vol. 7, no. 3, pp. 298–320, 2017.
  • M. Saki, A. Iranmanesh, and A. Tehranian, “Computing the edge geometric –arthimetic index of V-phenylenic nanotube,” J. Comput. Theor. Nanoence, Vol. 12, no. 9, pp. 2552–2555, 2015.
  • Z. Ning, X. Kong, F. Xia, et al., “Green and sustainable cloud of things: enabling collaborative edge computing,” IEEE Commun. Mag., Vol. 57, no. 1, pp. 72–78, 2018.
  • D. Belli, S. Chessa, L. Foschini, et al., “A probabilistic model for the deployment of human-enabled edge computing in massive sensing scenarios,” IEEE Internet Things J., Vol. 7, no. 3, pp. 2421–2431, 2020.
  • M. Amadeo, C. Campolo, G. Ruggeri, et al., “SDN-managed provisioning of named computing services in edge infrastructures,” IEEE Trans. Netw. Serv. Manage., Vol. 16, no. 4, pp. 1464–1478, 2019.
  • S. Dama, V. Sathya, K. Kuchi, et al., “A feasible cellular internet of things: enabling edge computing and the IoT in dense futuristic cellular networks,” IEEE Cons. Electr. Mag., Vol. 6, no. 1, pp. 66–72, 2016.
  • A. T. H. Hashem, I. Yaqoob, N. B. Anuar, et al., “The rise of “big data” on cloud computing: review and open research issues,” Inf. Syst., Vol. 47, pp. 98–115, 2015.
  • R. Chandra S, and W. Yafeng, “Cloud things construction – the integration of internet of things and cloud computing,” Future Gener. Comput. Syst., Vol. 56, no. C, pp. 684–700, 2016.
  • H. Chen, X. Zhu, H. Guo, et al., “Towards energy-efficient scheduling for real-time tasks under uncertain cloud computing environment,” J. Syst. Softw., Vol. 99, pp. 20–35, 2015.
  • Z. Xia, X. Wang, L. Zhang, et al., “A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing,” IEEE Trans. Inform. Forens. Secur., Vol. 11, no. 11, pp. 2594–2608, 2017.
  • Q. Huang, Z. Ma, Y. Yang, et al., “EABDS: attribute-based secure data sharing with efficient revocation in cloud computing,” Chin. J. Electr., Vol. 24, no. 4, pp. 862–868, 2015.
  • G. Kaur, M. Garg, and N. Jyoti M, “Enhanced security mechanism in cloud computing: a review,” Lancet, Vol. 353, no. 9168, pp. 1919–1922, 2015.
  • A. Javed, H. Larijani, A. Ahmadinia, et al., “Smart random neural network controller for HVAC using cloud computing technology,” IEEE Trans. Ind. Inf., Vol. 13, no. 1, pp. 351–360, 2017.
  • T. Taleb, K. Samdanis, B. Mada, et al., “On multi-access edge computing: a survey of the emerging 5G network edge cloud architecture and orchestration,” IEEE Commun. Surv. Tutor., Vol. 19, no. 3, pp. 1657–1681, 2017.
  • S. Nastic, T. Rausch, O. Scekic, et al., “A serverless real-time data analytics platform for edge computing,” IEEE Internet Comput., Vol. 21, no. 4, pp. 64–71, 2017.
  • C. Hsieh H, L. Chen J, and A. Benslimane, “5G virtualized multi-access edge computing platform for IoT applications,” J. Netw. Comput. Appl., Vol. 115, pp. 94–102, 2018.
  • S. Tony, “Rugged self-monitoring platform targets edge computing market,” Drives Contr., Vol. 34, no. 6, pp. 58–58, 2018.
  • Y. Tu, Z. Dong, and H. Yang, “Key technologies and application of edge computing,” ZTE Commun., Vol. 15, no. 56, pp. 30–38, 2017.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.