A new security middleware architecture based on fog computing and cloud to support IoT constrained devices.
Wissam RazoukDaniele SgandurraKouichi SakuraiPublished in: IML (2017)
Keyphrases
- middleware architecture
- cloud computing
- cloud computing environment
- security issues
- voice and data services
- computing infrastructure
- cloud storage
- data management
- mobile agents
- mobile devices
- single image
- cloud services
- databases
- network security
- information security
- management system
- end users
- statistical databases
- location information
- key management
- big data
- mobile agent system
- ubiquitous environment
- service providers
- information systems