4.7 Review

A review on trust management in fog/edge computing: Techniques, trends, and challenges

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Near Optimal Charging Schedule for 3-D Wireless Rechargeable Sensor Networks

Chi Lin et al.

Summary: This paper addresses the issue of serving a 3-D wireless rechargeable sensor network (WRSN) using an unmanned aerial vehicle (UAV) for charging. The main objective is to maximize the charged energy for sensors supplied by the UAV while considering the energy constraints of the UAV. The authors propose spatial and temporal discretization schemes to determine charging spots and durations, and present a cost-efficient algorithm with provable approximation ratio to solve the problem. Test-bed experiments and simulations demonstrate the feasibility and superior performance of their scheme in terms of charged energy and robustness.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Review Computer Science, Interdisciplinary Applications

A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing

Mehrdad Jangjou et al.

Summary: This paper investigates the security challenges in different network layers of cloud computing and provides useful methods for system designers to understand and prevent security risks. It also introduces emerging solutions and preventive methods to reduce vulnerabilities in various network layers.

ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING (2022)

Article Computer Science, Information Systems

Towards effective offloading mechanisms in fog computing

Maryam Sheikh Sofla et al.

Summary: This paper evaluates fog offloading mechanisms, discusses current and future trends, categorizes different types of offloading mechanisms, analyzes the pros and cons of each mechanism, and provides a reference for addressing offloading issues in fog computing.

MULTIMEDIA TOOLS AND APPLICATIONS (2022)

Review Computer Science, Interdisciplinary Applications

Big Data Analytics in Weather Forecasting: A Systematic Review

Marzieh Fathi et al.

Summary: This paper discusses the importance of big data analytics in weather forecasting, introduces some technologies and methods for handling meteorological data, proposes specific methods for comparison and classification, and discusses future trends and potential issues.

ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING (2022)

Article Computer Science, Information Systems

Subjective logic-based trust model for fog computing

Jalal Al Muhtadi et al.

Summary: Fog computing is a new paradigm that extends cloud computing capabilities to the network edge, providing better location awareness and reducing latency. This study focuses on security and privacy challenges in fog computing, proposing a trust mechanism to address data security issues and demonstrating the efficacy of the model through simulation analysis.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Hardware & Architecture

ESTIMATION OF TRUST USING LOGISTIC REGRESSION IN FOG COMPUTING

R. Priyadarshini et al.

MICROPROCESSORS AND MICROSYSTEMS (2021)

Article Computer Science, Artificial Intelligence

Mobile edge-enabled trust evaluation for the Internet of Things

Tian Wang et al.

Summary: This paper presents a novel trust evaluation model based on trust transitivity assisted by mobile edge nodes to ensure the reliability of nodes in the Internet of Things and prevent malicious attacks. The model measures trust degrees of different trust chains and collects trust information of sensor nodes using an improved Dijkstra's algorithm. Experimental results show that the trust model based on mobile edge nodes can evaluate sensor nodes more precisely and enhance security in the Internet of Things.

INFORMATION FUSION (2021)

Article Telecommunications

A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET

Seyed Ahmad Soleymani et al.

Summary: This study focuses on security and privacy issues in Vehicular Ad Hoc Networks (VANETs), addressing selfish nodes with a privacy-preserving node and message authentication scheme, a trust model, and mapping vehicles with pseudo-identities. By utilizing fog nodes instead of road-side units, latency is reduced, and throughput is increased, demonstrating the effectiveness of the proposed scheme.

VEHICULAR COMMUNICATIONS (2021)

Review Computer Science, Hardware & Architecture

A systematic review of IoT in healthcare: Applications, techniques, and trends

Mostafa Haghi Kashani et al.

Summary: Internet of Things (IoT) is an expanding ecosystem integrating software, hardware, physical objects, and computing devices for communication, data collection, and exchange. In healthcare systems, IoT shows potential in reducing strain and providing tailored health services. A systematic review of 146 articles classified existing Healthcare IoT (HIoT) systems, discussed their benefits and limitations, and highlighted future trends and challenges in the field.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Computer Science, Interdisciplinary Applications

Blockchain and edge computing technology enabling organic agricultural supply chain: A framework solution to trust crisis

Sensen Hu et al.

Summary: The credibility of information on organic agri-products has been a major issue hindering the participation of small farms in high value-added agriculture, but emerging blockchain and edge computing technologies offer an opportunity for improvement. By constructing a trust framework with better cost and efficiency balance, significant performance improvement and cost reduction can be achieved, providing affordable traceability solutions for developing countries.

COMPUTERS & INDUSTRIAL ENGINEERING (2021)

Article Computer Science, Information Systems

Resource allocation and trust computing for blockchain-enabled edge computing system

Lejun Zhang et al.

Summary: This paper proposes a reliable and efficient system based on edge computing and blockchain, covering innovations in group-agent strategy, task sorting mechanism, and content model. Simulation results demonstrate that the proposed scheme has better computational efficiency and higher reliability compared with existing methods.

COMPUTERS & SECURITY (2021)

Article Computer Science, Hardware & Architecture

EDGE-INTELLIGENCE-EMPOWERED, UNIFIED AUTHENTICATION AND TRUST EVALUATION FOR HETEROGENEOUS BEYOND 5G SYSTEMS

Qimei Cui et al.

Summary: This article explores the authentication and compromised user equipment (UE) detection in EI-powered 5G and beyond 5G (B5G) systems, proposing new authentication framework and UE detection method to enhance efficiency and detection rate.

IEEE WIRELESS COMMUNICATIONS (2021)

Article Computer Science, Hardware & Architecture

Edge-centric trust management in vehicular networks

Hesham El-Sayed et al.

Summary: The goal of vehicular networking is to enhance road safety and alleviate traffic congestion. A trust management system is proposed to identify the trustworthiness of individual vehicles and detect malicious drivers. The hybrid solution integrates edge computing and multi-agent modeling and outperforms similar approaches in addressing major security challenges in vehicular networks.

MICROPROCESSORS AND MICROSYSTEMS (2021)

Article Telecommunications

Trust Enforced Computational Offloading for Health Care Applications in Fog Computing

V. Meena et al.

Summary: Internet of Things (IoT) is a network of internet connected devices that generate large amounts of data daily, and is increasingly used in various fields such as healthcare. This paper introduces a novel Trust Enforced computation of FLoading technique for trustworthy applications using fog computing (TEFLON), improving success rate of fog collaboration and ensuring trust for trustworthy applications through optimal service offloader and trust assessment algorithms.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Computer Science, Information Systems

Trust based task offloading scheme in UAV-enhanced edge computing network

Yan Ouyang et al.

Summary: In this paper, a UAV-Trust based Task Offloading scheme is proposed to achieve energy efficient and reliable edge computing by utilizing cluster-based task offloading and trust evaluation mechanisms. Experimental results demonstrate a significant improvement in the efficiency and success rate of task offloading.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Computer Science, Hardware & Architecture

Trust-based load-offloading protocol to reduce service delays in fog-computing-empowered IoT

Nabajyoti Mazumdar et al.

Summary: The proliferation of IoT-enabled applications has led to a significant increase in data production, especially for time-sensitive applications. Traditional cloud-based two-layer frameworks suffer from delays in data processing, prompting the proposal of a three-layer IoT-fog-cloud framework with load-sharing and trust-based security mechanisms to address these issues effectively.

COMPUTERS & ELECTRICAL ENGINEERING (2021)

Review Computer Science, Software Engineering

Leveraging big data in smart cities: A systematic review

Yaghoob Karimi et al.

Summary: This article examines the latest developments in big data handling approaches in smart cities, focusing on their applications in urban management and decision-making. It summarizes research results under different algorithms and architectures, analyzes evaluation metrics, advantages, and disadvantages, and introduces challenges and trends for future research.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2021)

Article Computer Science, Information Systems

Fog-based healthcare systems: A systematic review

Zahra Ahmadi et al.

Summary: The healthcare system aims to improve the health of society through reliable and organized solutions. With the significant growth in healthcare systems, fog computing architecture is proposed to address challenges such as data volume, response time, latency, and security vulnerabilities. By placing processing components between end devices and cloud components, the fog computing architecture can provide real-time response and low latency for healthcare applications.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Computer Science, Information Systems

An edge based trustworthy environment establishment for internet of things: an approach for smart cities

Serin V. Simpson et al.

Summary: With the development of smart cities, IoT devices with limited resources are unable to handle heterogeneous and cross-application services, leading to the introduction of edge computing to address network constraints in cloud computing. However, the large deployment of edge nodes also introduces security issues, especially vulnerable to Sybil attacks.

WIRELESS NETWORKS (2021)

Article Computer Science, Information Systems

A trust management system for fog computing services

Sunday Oyinlola Ogundoyin et al.

Summary: Fog computing extends traditional cloud computing to the edge of the network, with a focus on decentralized computing infrastructure and secure offloading through a bi-directional trust management system. Trust computation is based on quality, security, and social relationships, using fuzzy logic to handle uncertainty, with decay and credence functions to model past reputation and mitigate false recommendations. Simulation results show TMS can detect and mitigate a significant portion of attacks in a malicious fog computing environment.

INTERNET OF THINGS (2021)

Review Information Science & Library Science

Big data analytics meets social media: A systematic review of techniques, open issues, and future directions

Sepideh Bazzaz Abkenar et al.

Summary: Social Networking Services connect people worldwide through sharing contents, photos, and videos, with big data analytics techniques commonly exploited in Social Network Analysis. The research mainly focuses on big data analytic approaches in social networks, classified into content-oriented and network-oriented methods, discussing their advantages and disadvantages.

TELEMATICS AND INFORMATICS (2021)

Article Computer Science, Software Engineering

SDN/NFV security framework for fog-to-things computing infrastructure

Prabhakar Krishnan et al.

SOFTWARE-PRACTICE & EXPERIENCE (2020)

Article Computer Science, Information Systems

Trust management in social Internet of Things: A taxonomy, open issues, and challenges

Rajanpreet Kaur Chahal et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Theory & Methods

Secure Cloud-Edge Deployments, with Trust

Stefano Forti et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Automation & Control Systems

Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure

Jing Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Automation & Control Systems

A Blockchain-Based Trusted Data Management Scheme in Edge Computing

Ma Zhaofeng et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Engineering, Electrical & Electronic

Quality of service-aware approaches in fog computing

Mostafa Haghi Kashani et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2020)

Review Computer Science, Hardware & Architecture

Fog-based smart homes: A systematic review

Morteza Rahimi et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Theory & Methods

COMITMENT: A Fog Computing Trust Management Approach

Mohammed Al-khafajiy et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2020)

Article Computer Science, Information Systems

A trust evaluation system based on reputation data in Mobile edge computing network

Xiaoheng Deng et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2020)

Article Computer Science, Information Systems

Multi-dimensional dynamic trust evaluation scheme for cloud environment

Praveen S. Challagidad et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Theory & Methods

A two-way trust management system for fog computing

Esubalew Alemneh et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Automation & Control Systems

Energy-Efficient and Trustworthy Data Collection Protocol Based on Mobile Fog Computing in Internet of Things

Tian Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

Blockchain-Based Trustworthy Edge Caching Scheme for Mobile Cyber-Physical System

Qichao Xu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Review Computer Science, Information Systems

Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes

Avani Sharma et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A Reliable Trust Computing Mechanism Based on Multisource Feedback and Fog Computing in Social Sensor Cloud

Junbin Liang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Automation & Control Systems

Trust management and evaluation for edge intelligence in the Internet of Things

Kashif Naseer Qureshi et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2020)

Article Engineering, Electrical & Electronic

A Reinforcement Learning and Blockchain-Based Trust Mechanism for Edge Networks

Liang Xiao et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A blockchain-based IoT data management scheme using Bernoulli distribution convergence in the mobile edge computing

Yoon-Su Jeong et al.

PERSONAL AND UBIQUITOUS COMPUTING (2020)

Article Computer Science, Artificial Intelligence

A Fuzzy-AHP based prioritization of trust criteria in fog computing services

Sunday Oyinlola Ogundoyin et al.

APPLIED SOFT COMPUTING (2020)

Article Construction & Building Technology

Trustworthy and sustainable smart city services at the edge

Yaser Jararweh et al.

SUSTAINABLE CITIES AND SOCIETY (2020)

Article Computer Science, Information Systems

TIDES: A Trust-Aware IoT Data Economic System With Blockchain-Enabled Multi-Access Edge Computing

I-Hsun Chuang et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Trust and Reputation in the Internet of Things: State-of-the-Art and Research Challenges

Giancarlo Fortino et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Context-Aware Trust and Reputation Model for Fog-Based IoT

Yasir Hussain et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive Survey

Wajid Rafique et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

Off-Street Vehicular Fog for Catering Applications in 5G/B5G: A Trust-Based Task Mapping Solution and Open Research Issues

Fatin Hamadah Rahman et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things

Vishal Sharma et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Theory & Methods

Multi-access edge computing aided mobility for privacy protection in Internet of Things

Ping Zhang et al.

COMPUTING (2019)

Article Computer Science, Theory & Methods

A Thorough Trust and Reputation Based RBAC Model for Secure Data Storage in the Cloud

Mahdi Ghafoorian et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2019)

Article Computer Science, Hardware & Architecture

Trust models of internet of smart things: A survey, open issues, and future directions

Ayesha Altaf et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Hardware & Architecture

All one needs to know about fog computing and related edge computing paradigms: A complete survey

Ashkan Yousefpour et al.

JOURNAL OF SYSTEMS ARCHITECTURE (2019)

Review Computer Science, Information Systems

Trust-based recommendation systems in Internet of Things: a systematic literature review

Venus Mohammadi et al.

HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

TACRM: trust access control and resource management mechanism in fog computing

Wided Ben Daoud et al.

HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2019)

Article Computer Science, Hardware & Architecture

BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network

Shailendra Rathore et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Review Computer Science, Hardware & Architecture

Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges

Abdelmuttlib Ibrahim Abdalla Ahmed et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

Crowdsourcing Mechanism for Trust Evaluation in CPCS Based on Intelligent Mobile Edge Computing

Tian Wang et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2019)

Article Computer Science, Theory & Methods

Trust management in a blockchain based fog computing platform with trustless smart oracles

Petar Kochovski et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Review Computer Science, Information Systems

Trust Establishment and Estimation in Cloud Services: A Systematic Literature Review

Kanwal Mahmud et al.

JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT (2019)

Article Computer Science, Theory & Methods

Trust Evaluation in Cross-Cloud Federation: Survey and Requirement Analysis

Usama Ahmed et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Information Systems

A Comprehensive Study on the Trust Management Techniques in the Internet of Things

Behrouz Pourghebleh et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Cybernetics

A Novel Stream Clustering Framework for Spam Detection in Twitter

Hadi Tajalizadeh et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2019)

Article Computer Science, Information Systems

Trust Management Techniques for the Internet of Things: A Survey

Ikram Ud Din et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Trust-Aware Task Offloading Framework in Mobile Edge Computing

Dexiang Wu et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

Potentials, trends, and prospects in edge technologies: Fog, cloudlet, mobile edge, and micro data centers

Kashif Bilal et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Information Systems

Bubbles of Trust: A decentralized blockchain-based authentication system for IoT

Mohamed Tahar Hammi et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Theory & Methods

Security and trust issues in Fog computing: A survey

PeiYun Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges

Rodrigo Roman et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

A Trustworthy Content Caching and Bandwidth Allocation Scheme With Edge Computing for Smart Campus

Qichao Xu et al.

IEEE ACCESS (2018)

Article Telecommunications

Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System

Tian Wang et al.

IEEE COMMUNICATIONS LETTERS (2017)

Article Computer Science, Information Systems

A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing

Seyed Ahmad Soleymani et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Security and Privacy in Fog Computing: Challenges

Mithun Mukherjee et al.

IEEE ACCESS (2017)

Review Computer Science, Information Systems

A survey of trust computation models for service management in internet of things systems

Jia Guo et al.

COMPUTER COMMUNICATIONS (2017)

Article Computer Science, Hardware & Architecture

Managing Trust in the Cloud: State of the Art and Research Challenges

Talal H. Noor et al.

COMPUTER (2016)

Article Computer Science, Information Systems

Trust Management for SOA-Based IoT and Its Application to Service Composition

Ing-Ray Chen et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2016)

Review Computer Science, Information Systems

Fog and IoT: An Overview of Research Opportunities

Mung Chiang et al.

IEEE INTERNET OF THINGS JOURNAL (2016)

Review Computer Science, Information Systems

Edge Computing: Vision and Challenges

Weisong Shi et al.

IEEE INTERNET OF THINGS JOURNAL (2016)

Article Computer Science, Hardware & Architecture

Security, privacy and trust in Internet of Things: The road ahead

S. Sicari et al.

COMPUTER NETWORKS (2015)

Article Computer Science, Theory & Methods

Dynamic and flexible selection of a reputation mechanism for heterogeneous environments

Gines Dolera Tormo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)

Article Telecommunications

Trust Management Mechanism for Internet of Things

Gu Lize et al.

CHINA COMMUNICATIONS (2014)

Article Computer Science, Hardware & Architecture

A survey on trust management for Internet of Things

Zheng Yan et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Review Computer Science, Information Systems

A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective

Shanzhi Chen et al.

IEEE INTERNET OF THINGS JOURNAL (2014)

Article Computer Science, Information Systems

The Case for VM-Based Cloudlets in Mobile Computing

Mahadev Satyanarayanan et al.

IEEE PERVASIVE COMPUTING (2009)

Article Computer Science, Information Systems

Systematic literature reviews in software engineering - A systematic literature review

Barbara Kitchenham et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2009)

Article Computer Science, Software Engineering

Lessons from applying the systematic literature review process within the software engineering domain

Pearl Brereton et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2007)