References
[1].
Abdel-Basset, M., Moustafa, N., Hawash, H., Ding, W.,
Abdel-Basset, M., Moustafa, N., ... & Ding, W. (2022).
Internet of things, preliminaries and foundations. Deep
Learning Techniques for Iot Security and Privacy (pp. 37-65).
[3]. Ahmad, S. (2016). Data Protection in Cloud
Computing- vulnerabilities, challenges and Solution.
International Journal of Computer Trends and
Technology, 34(4), 179-185.
[4].
Ahmad, W., Rasool, A., Javed, A. R., Baker, T., & Jalil, Z.
(2022). Cyber security in iot-based cloud computing: A comprehensive survey. Electronics, 11(1), 16.
[8].
Ali, O., Ishak, M. K., Bhatti, M. K. L., Khan, I., & Kim, K. I.
(2022). A Comprehensive Review of Internet of Things:
Technology Stack, Middlewares, and Fog/Edge
Computing Interface. Sensors, 22(3), 995.
[10].
Atlam, H. F., Alenezi, A., Alharthi, A., Walters, R. J., &
Wills, G. B. (2017, June). Integration of cloud computing
with internet of things: challenges and open issues. In
2017 IEEE International Conference on Internet of Things
(Ithings) and IEEE Green Computing and Communications
(Greencom) and IEEE Cyber, Physical and Social
Computing (Cpscom) and IEEE Smart Data (Smartdata)
(pp. 670-675). IEEE.
[13].
Bellavista, P., Berrocal, J., Corradi, A., Das, S. K.,
Foschini, L., & Zanni, A. (2019). A survey on fog computing
for the Internet of Things. Pervasive and Mobile
Computing, 52, 71-99.
[17].
Dastjerdi, A. V., Gupta, H., Calheiros, R. N., Ghosh, S.
K., & Buyya, R. (2016). Fog computing: Principles,
architectures, and applications. In Internet of Things (pp.
61-75). Morgan Kaufmann.
[18].
Du, M., Wang, K., Chen, Y., Wang, X., & Sun, Y.
(2018). Big data privacy preserving in multi-access edge
computing for heterogeneous Internet of Things. IEEE
Communications Magazine, 56(8), 62-67.
[19]. Garg, A., & Rathi, R. (2019). A survey on cloud
computing risks and remedies. International Journal of
Computer Applications, 178(29), 35-37.
[21].
Hassan, W., Chou, T. S., Li, X., Appiah-Kubi, P., &
Tamer, O. (2019). Latest trends, challenges and solutions
in security in the era of cloud computing and software
defined networks. International Journal of Informatics
and Communication Technology, 3(3), 162-183.
[22].
Hou, Y., Garg, S., Hui, L., Jayakody, D. N. K., Jin, R., &
Hossain, M. S. (2020). A data security enhanced access
control mechanism in mobile edge computing. IEEE
Access, 8, 136119-136130.
[27].
Khan, A. N., Ali, M., Khan, A. U. R., Khan, F. G., Khan, I.
A., Jadoon, W., ... & Chronopoulos, A. T. (2017). A
comparative study and workload distribution model for
re-encryption schemes in a mobile cloud computing
environment. International Journal of Communication
Systems, 30(16), e3308.
[29].
Kong, L., Tan, J., Huang, J., Chen, G., Wang, S., Jin,
X., ... & Das, S. K. (2022). Edge-computing-driven internet
of things: a survey. ACM Computing Surveys, 55(8), 1-41.
[32]. Kouchay, S. A. (2020). Cloud security vulnerabilities
and solution model. Review of Computer Engineering
Research, 7(1), 12-19.
[34]. Lei, H., Qiu, C., Yao, H., & Guo, S. (2019). When
blockchain-enabled internet of things meets cloud
computing. Computer, 52(12), 16-17.
[36]. Masri, W., Al Ridhawi, I., Mostafa, N., & Pourghomi, P.
(2017, July). Minimizing delay in IoT systems through
collaborative fog-to-fog (F2F) communication. In 2017
Ninth International Conference on Ubiquitous and Future
Networks (ICUFN) (pp. 1005-1010). IEEE.
[37]. Morphy, R. (2021). Fundamental Security for IoT and
IoMT Devices within Health Care in the Absence of
Industry Standards (Doctoral dissertation, Capella
University).
[38].
Ometov, A., Molua, O. L., Komarov, M., & Nurmi, J.
(2022). A survey of security in cloud, edge, and fog
computing. Sensors, 22(3), 927.
[39]. Peter, N. (2015). Fog computing and its real time
applications. International Journal of Emerging
Technology and Advanced Engineering, 5(6), 266-269.
[44].
Sulieman, N. A., Ricciardi Celsi, L., Li, W., Zomaya,
A., & Villari, M. (2022). Edge-oriented computing: A
survey on research and use cases. Energies, 15(2), 452.
[45]. Vermesan, O., Bahr, R., Falcitelli, M., Brevi, D., Bosi, I.,
Dekusar, A., ... & Schreiner, F. (2020). IoT technologies for
connected and automated driving applications. In O.
Vermesan, & J. Bacquet (Eds.), Internet of Things–The Call
of the Edge: Everything Intelligent Everywhere (pp. 255-306). River Publishers.
[46]. Vumo, A. P., Spillner, J., & Köpsell, S. (2019, July). A
data security framework for cloud computing adoption:
Mozambican government cloud computing. In
European Conference on Cyber Warfare and Security
(pp. 720). Academic Conferences International Limited.
[48]. Wang, X., Han, Y., Leung, V. C., Niyato, D., Yan, X., &
Chen, X. (2020). Convergence of edge computing and
deep learning: A comprehensive survey. IEEE
Communications Surveys & Tutorials, 22(2), 869-904.
[50].
Wen, Z., Yang, R., Garraghan, P., Lin, T., Xu, J., &
Rovatsos, M. (2017). Fog orchestration for internet of
things services. IEEE Internet Computing, 21(2), 16-24.
[52].
Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K.,
Jalali, F., Niakanlahiji, A., ... & Jue, J. P. (2019). All one
needs to know about fog computing and related edge computing paradigms: A complete survey. Journal of
Systems Architecture, 98, 289-330.