Hot Keywords
Cyber-physical systems Post-quantum cryptography Public-key cryptography Edge computing Anti-forensics Big data security control selection Attacks on IoT systems Domain Name System DNS attacks Network security Transport layer security protocol

Top

Volume 3, Issue 1 (March, 2022) –

Cover Picture: In this original article, a novel auditing scheme based on multi-level storage is proposed for 5G and beyond defined edge computing. To reduce the response time of data queries, they first present a storage system with neighborhood servers. Then, a scheme for third-party-assisted auditing is described. Users can audit their data using self-defined file names. The result shows that the novel proposal is efficient for the application in 5G and beyond defined edge computing.
view this paper

Editorial

Original Article

Actions for selected articles

© 2016-2023 OAE Publishing Inc., except certain content provided by third parties