Chen et al., 2013 - Google Patents
Addressing data and user mobility challenges in the cloudChen et al., 2013
- Document ID
- 4361834066667806920
- Author
- Chen L
- Hoang D
- Publication year
- Publication venue
- 2013 IEEE Sixth International Conference on Cloud Computing
External Links
Snippet
Recently cloud computing has been increasingly gaining attention and spreading in various industries. This novel paradigm also has received significant research focus on the data security and privacy issues due to its outsourced nature. However, few of the research efforts …
- 238000003892 spreading 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W76/00—Connection management, e.g. connection set-up, manipulation or release
- H04W76/02—Connection set-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W68/00—Notification of users, e.g. alerting for incoming communication or change of service
- H04W68/12—Inter-network notification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation, e.g. WAP [Wireless Application Protocol]
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/04—Network-specific arrangements or communication protocols supporting networked applications adapted for terminals or networks with limited resources or for terminal portability, e.g. wireless application protocol [WAP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data session or connection
- H04W36/0033—Control or signalling for completing the hand-off for data session or connection with transfer of context information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W60/00—Registration, e.g. affiliation to network; De-registration, e.g. terminating affiliation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Al‐Turjman et al. | An overview of security and privacy in smart cities' IoT communications | |
Hassija et al. | A survey on IoT security: application areas, security threats, and solution architectures | |
Zhang et al. | Security and trust issues in fog computing: A survey | |
Osanaiye et al. | From cloud to fog computing: A review and a conceptual live VM migration framework | |
Yi et al. | Security and privacy issues of fog computing: A survey | |
US9294489B2 (en) | Method and apparatus for detecting an intrusion on a cloud computing service | |
Jain et al. | Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures | |
Mukherjee et al. | Security and privacy issues and solutions for fog | |
Sahu et al. | Cloud computing in mobile applications | |
Hasan et al. | WORAL: A witness oriented secure location provenance framework for mobile devices | |
Ashik et al. | Designing a fog-cloud architecture using blockchain and analyzing security improvements | |
Granjal et al. | An Intrusion Detection and Prevention Framework for Internet‐Integrated CoAP WSN | |
Xiao et al. | An accountable framework for sensing-oriented mobile cloud computing | |
Tawfik et al. | A review: the risks and weakness security on the IoT | |
Chen et al. | Addressing data and user mobility challenges in the cloud | |
Yan et al. | Location-based services and privacy protection under mobile cloud computing | |
Dhande | Fog computing: review of privacy and security issues | |
Zhong et al. | Networking cyber-physical systems: System fundamentals of security and privacy for next-generation wireless networks | |
Wang et al. | Security enhancement of internet of things using service level agreements and lightweight security | |
Mira et al. | Review of Analysis on IoT Components, Devices and Layers Security | |
Mani Sekhar et al. | Security and privacy in 5G-enabled internet of things: a data analysis perspective | |
Das et al. | Smart City Vulnerabilities: An Overview | |
Rao et al. | An Overall Perspective on Establishing End-to-End Security in Enterprise IoT (E-IoT) | |
Vaish et al. | Data location verification in cloud computing | |
Gaba et al. | Security and privacy issues in fog computing |