版权说明 操作指南
首页 > 成果 > 详情

Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing

认领
导出
Link by 万方学术期刊
反馈
分享
QQ微信 微博
成果类型:
期刊论文
作者:
Fu, Jun-Song;Liu, Yun*;Chao, Han-Chieh;Bhargava, Bharat K.;Zhang, Zhen-Jiang
通讯作者:
Liu, Yun
作者机构:
[Zhang, Zhen-Jiang; Liu, Yun; Fu, Jun-Song] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China.
[Chao, Han-Chieh] Fujian Univ Technol, Sch Informat Sci & Engn, Fuzhou 350118, Fujian, Peoples R China.
[Chao, Han-Chieh] Wuhan Polytech Univ, Sch Math & Comp Sci, Wuhan 430023, Hubei, Peoples R China.
[Chao, Han-Chieh] Natl Dong Hwa Univ, Dept Elect Engn, Hualien 974, Taiwan.
[Chao, Han-Chieh] Natl Ilan Univ, Dept Comp Sci & Informat Engn, Ilan 26041, Taiwan.
通讯机构:
[Liu, Yun] B
Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China.
语种:
英文
关键词:
Cloud computing;fog computing;industrial Internet of things (IIoT);secure data storage and retrieval
期刊:
IEEE Transactions on Industrial Informatics
ISSN:
1551-3203
年:
2018
卷:
14
期:
10
页码:
4519-4528
基金类别:
Manuscript received November 28, 2017; revised December 24, 2017; accepted January 1, 2018. Date of publication January 15, 2018; date of current version October 3, 2018. This work was supported in part by Fundamental Research Funds for the Central Universities under Grant 2015YJS027 and in part by Natural Science Foundation under Grant 61772064. Paper no. 17-2732. (Corresponding author: Yun Liu.) J.-S. Fu, Y. Liu, and Z.-J. Zhang are with the School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China (e-mail: 14111005@bjtu.edu.cn; liuyun@bjtu.edu.cn; zhangzhenjiang@bjtu.edu.cn).
机构署名:
本校为其他机构
院系归属:
数学与计算机学院
摘要:
With the fast development of industrial Internet of things (IIoT), a large amount of data is being generated continuously by different sources. Storing all the raw data in the IIoT devices locally is unwise considering that the end devices' energy and storage spaces are strictly limited. In addition, the devices are unreliable and vulnerable to many threats because the networks may be deployed in remote and unattended areas. In this paper, we discuss the emerging challenges in the aspects of data processing, secure data storage, efficient data retrieval and dynamic data collection in IIoT. The...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com