Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Review Article

Dynamic Data Placement Strategy with Network Security Issues in Distributed Cloud Environment for Medical Issues: An Overview

Author(s): Devasis Pradhan*, Majusha Behera and Mehdi Gheisari

Volume 17, Issue 6, 2024

Published on: 06 February, 2024

Article ID: e060224226747 Pages: 14

DOI: 10.2174/0126662558285372240109113226

Price: $65

Abstract

The rapid integration of distributed cloud systems in the healthcare industry has profoundly impacted the management of valuable medical data. While this advancement has significantly improved data handling, protecting sensitive healthcare information in such a complex environment remains daunting. This comprehensive study explores the crucial intersection between dynamic data placement strategies and network security concerns in distributed cloud environments, particularly healthcare. After establishing the significance and context of this research, the survey delves into the growing need to safeguard medical data within the everevolving landscape of cloud-based healthcare systems. It lays out fundamental concepts, such as dynamic data placement and network security, highlighting their unique implications in the medical domain. Ultimately, this survey sheds light on the most effective approaches for balancing dynamic data placement and network security in the healthcare sector. This research delves into examining many tactics, evaluating their effectiveness in handling delicate medical information, and presenting tangible use cases. A key focus of this investigation is the fusion of data organization and network safety within the healthcare industry. It investigates the adaptability of dynamic data positioning techniques in fortifying network security and safeguarding against potential threats unique to the healthcare sector. Case studies of the successful implementation of these strategies in healthcare establishments are also included.

[1]
H. Sun, Y. Chen, K. Sha, S. Huang, X. Wang, and W. Shi, "A proactive on-demand content placement strategy in edge intelligent gateways", IEEE Trans. Parallel Distrib. Syst., vol. 34, no. 7, pp. 2072-2090, 2023.
[http://dx.doi.org/10.1109/TPDS.2023.3249797]
[2]
M. Ali, A. Anjum, O. Rana, A.R. Zamani, D. Balouek-Thomert, and M. Parashar, "RES: Real-time video stream analytics using edge enhanced clouds", IEEE Trans. Cloud Comput., vol. 10, no. 2, pp. 792-804, 2022.
[http://dx.doi.org/10.1109/TCC.2020.2991748]
[3]
E. Ghabashneh, and S. Rao, "Exploring the interplay between CDN caching and video streaming performance", IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, 2020, pp. 516-525.
[http://dx.doi.org/10.1109/INFOCOM41043.2020.9155338]
[4]
S. Yang, L. Jiao, R. Yahyapour, and J. Cao, "Online orchestration of collaborative caching for multi-bitrate videos in edge computing", IEEE Trans. Parallel Distrib. Syst., vol. 33, no. 12, pp. 4207-4220, 2022.
[http://dx.doi.org/10.1109/TPDS.2022.3182022]
[5]
Y. Guan, X. Zhang, and Z. Guo, "PrefCache: Edge cache admission with user preference learning for video content distribution", IEEE Trans. Circ. Syst. Video Tech., vol. 31, no. 4, pp. 1618-1631, 2021.
[http://dx.doi.org/10.1109/TCSVT.2020.3006388]
[6]
J. Zerwas, I. Poese, S. Schmid, and A. Blenk, "On the benefits of joint optimization of reconfigurable CDN-ISP infrastructure", IEEE Trans. Netw. Serv. Manag., vol. 19, no. 1, pp. 158-173, 2022.
[http://dx.doi.org/10.1109/TNSM.2021.3119134]
[7]
H. Feng, S. Guo, L. Yang, and Y. Yang, "Collaborative data caching and computation offloading for multi-service mobile edge computing", IEEE Trans. Vehicular Technol., vol. 70, no. 9, pp. 9408-9422, 2021.
[http://dx.doi.org/10.1109/TVT.2021.3099303]
[8]
M. Gheisari, E. Shojaeian, A. Javadpour, A. Jalili, H. Esmaeili-Najafabadi, B.S. Bigham, A.A. Vorobeva, Y. Liu, and M. Rezaei, "An agile privacy-preservation solution for iot-based smart city using different distributions", IEEE Open J. Veh. Technol., vol. 4, pp. 356-362, 2023.
[http://dx.doi.org/10.1109/OJVT.2023.3243226]
[9]
N.K. Kamila, S.K. Pani, R.P. Das, P.K. Bharti, H.E. Najafabadi, M. Gheisari, and Y. Liu, "A near-optimal & load balanced resilient system design for high-performance computing platform", Cluster Comput., vol. 26, no. 2, pp. 1535-1550, 2023.
[http://dx.doi.org/10.1007/s10586-022-03913-8]
[10]
L. Golightly, P. Modesti, R. Garcia, and V. Chang, "Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN", Cyber Secur. Applicat., vol. 1, p. 100015, 2023.
[11]
S.S. Vellela, B.V. Reddy, K.K. Chaitanya, and M.V. Rao, "An integrated approach to improve e-healthcare system using dynamic cloud computing platform", "2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), 2023.
23-25 January 2023, Tirunelveli, India [http://dx.doi.org/10.1109/ICSSIT55814.2023.10060945]
[12]
Y. Alemami, A.M. Al-Ghonmein, K.G. Al-Moghrabi, and M.A. Mohamed, "Cloud data security and various cryptographic algorithms", IJECE, vol. 13, no. 2, p. 1867, 2023.
[http://dx.doi.org/10.11591/ijece.v13i2.pp1867-1879]
[13]
R. Das, and M. M. Inuwa, "A review on fog computing: Issues, characteristics, challenges, and potential applications", Telemat. Inform. Rep., vol. 10, p. 100049, 2023.
[14]
H. Akbar, M. Zubair, and M.S. Malik, "The security issues and challenges in cloud computing", IJECI, vol. 7, no. 1, pp. 13-32, 2023.
[http://dx.doi.org/10.54692/ijeci.2023.0701125]
[15]
J. Chen, C. Yi, S.D. Okegbile, J. Cai, and X.S. Shen, "Networking architecture and key supporting technologies for human digital twin in personalized healthcare: A comprehensive survey", IEEE Commun. Surv. Tutor., p. 1, 2023.
[http://dx.doi.org/10.1109/COMST.2023.3308717]
[16]
S. Ahmad, S. Mehfuz, and J. Beg, "Hybrid cryptographic approach to enhance the mode of key management system in cloud environment", J. Supercomput., vol. 79, no. 7, pp. 7377-7413, 2023.
[http://dx.doi.org/10.1007/s11227-022-04964-9]
[17]
J.A. Alzubi, A. Movassagh, M. Gheisari, H.E. Najafabadi, A.A. Abbasi, and Y. Liu, "A dynamic SDN-based privacy-preserving approach for smart city using trust technique", 2022 9th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS), 2022.
02-04 March 2022, Bam, Iran, Islamic Republic of [http://dx.doi.org/10.1109/CFIS54774.2022.9756458]
[18]
K.A. Raza, A. Asheralieva, M.M. Karim, K. Sharif, M. Gheisari, and S. Khan, "A novel forwarding and caching scheme for information-centric software-defined networks", 2021 International Symposium on Networks, Computers and Communications (ISNCC), 2021, pp. 1-8.
[http://dx.doi.org/10.1109/ISNCC52172.2021.9615667]
[19]
A. Goscinski, F.C. Delicato, G. Fortino, A. Kobusińska, and G. Srivastava, "Special issue on distributed intelligence at the edge for the future internet of things", J. Parallel Distrib. Comput., vol. 171, pp. 157-162, 2023.
[http://dx.doi.org/10.1016/j.jpdc.2022.09.014]
[20]
M.D. Hossain, T. Sultana, S. Akhter, M.I. Hossain, N.T. Thu, L.N. Huynh, and E.N. Huh, The role of microservice approach in edge computing: Opportunities, challenges, and research directions., ICT Express, 2023.
[21]
H. K. Sinha, A. Kumar, and D. Pradhan, "A study of various peak to average power ratio (PAPR) reduction techniques for 5G communication system (5G‐CS)", In: Optimization Techniques in Engineering: Advances and Applications, Wiley, 2023.
[22]
M. Behera, D. Pradhan, and T. Majumder, "Energy efficient routing protocol for manet: FF-AOMDV", Journal of Data Acquisition and Processing, vol. 38, no. 2, p. 360, 2023.
[23]
K. Priyanka, G. Mallavaram, A. Raj, and D. Pradhan, "Cognitiveness of 5G technology toward sustainable development of smart cities", In: Decision Support Systems for Smart City Applications, Wiley, 2022.
[24]
D. Pradhan, A. Agarwal, H.M. Tun, Z.M. Naing, and T. Oo, "Critical security & privacy issue in blockchain technology intended to industry 4.0", Middle East Res. J. Eng. Technol., vol. 2, no. 1, pp. 1-7, 2022.
[25]
D. Pradhan, and K.C. Priyanka, SDR network & network function virtualization for 5G Green communication (5G-GC).Future Trends in 5G and 6G., CRC Press, 2021, pp. 183-203.
[http://dx.doi.org/10.1201/9781003175155-9]
[26]
D. Pradhan, P.K. Sahu, and M.M. Ghonge, "Security approaches to SDN-based ad hoc wireless network toward 5G communication", In: Software Defined Networking for Ad Hoc Networks, Springer International Publishing: Cham, 2022, pp. 141-156.
[27]
F. Kamalov, M. Gheisari, Y. Liu, M.R. Feylizadeh, and S. Moussa, "Critical controlling for the network security and privacy based on blockchain technology: A fuzzy DEMATEL approach", Sustainability, vol. 15, no. 13, p. 10068, 2023.
[http://dx.doi.org/10.3390/su151310068]
[28]
M. Safaei Yaraziz, A. Jalili, M. Gheisari, and Y. Liu, "Recent trends towards privacy‐preservation in Internet of Things, its challenges and future directions", IET Circuits Dev. Syst., vol. 17, no. 2, pp. 53-61, 2023.
[http://dx.doi.org/10.1049/cds2.12138]
[29]
A.A. Movassagh, J.A. Alzubi, M. Gheisari, M. Rahimi, S. Mohan, A.A. Abbasi, and N. Nabipour, "Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model", J. Ambient Intell. Humaniz. Comput., pp. 1-9, 2021.
[30]
M. Ghiasi, T. Niknam, Z. Wang, M. Mehrandezh, M. Dehghani, and N. Ghadimi, "A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future", Electr. Power Syst. Res., vol. 215, p. 108975, 2023.
[http://dx.doi.org/10.1016/j.epsr.2022.108975]
[31]
M.K. Hasan, A.K.M.A. Habib, Z. Shukur, F. Ibrahim, S. Islam, and M.A. Razzaque, "Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations", J. Netw. Comput. Appl., vol. 209, p. 103540, 2023.
[http://dx.doi.org/10.1016/j.jnca.2022.103540]
[32]
M. Saleem, M.R. Warsi, and S. Islam, "Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment", J. Inf. Secur. Appl., vol. 72, p. 103389, 2023.
[http://dx.doi.org/10.1016/j.jisa.2022.103389]
[33]
A. Garcia-Perez, J.G. Cegarra-Navarro, M.P. Sallos, E. Martinez-Caro, and A. Chinnaswamy, "Resilience in healthcare systems: Cyber security and digital transformation", Technovation, vol. 121, p. 102583, 2023.
[http://dx.doi.org/10.1016/j.technovation.2022.102583]
[34]
V. Demertzi, S. Demertzis, and K. Demertzis, "An overview of cyber threats, attacks and countermeasures on the primary domains of smart cities", Appl. Sci., vol. 13, no. 2, p. 790, 2023.
[http://dx.doi.org/10.3390/app13020790]
[35]
M. Ravinder, and V. Kulkarni, "A review on cyber security and anomaly detection perspectives of smart grid", 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), 2023, pp. 692-697.
[http://dx.doi.org/10.1109/ICSSIT55814.2023.10060871]
[36]
G.U. Srikanth, R. Geetha, and S. Prabhu, "An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems", Int. J. Inf. Technol., vol. 15, no. 3, pp. 1221-1230, 2023.
[http://dx.doi.org/10.1007/s41870-023-01173-2]
[37]
R. Natarajan, G.H. Lokesh, F. Flammini, A. Premkumar, V.K. Venkatesan, and S.K. Gupta, "A Novel Framework on Security and Energy Enhancement Based on Internet of Medical Things for Healthcare 5.0", Infrastructures, vol. 8, no. 2, p. 22, 2023.
[http://dx.doi.org/10.3390/infrastructures8020022]
[38]
M.A. Kamran, R. Kia, F. Goodarzian, and P. Ghasemi, "A new vaccine supply chain network under COVID-19 conditions considering system dynamic: Artificial intelligence algorithms", Socioecon. Plann. Sci., vol. 85, p. 101378, 2023.
[http://dx.doi.org/10.1016/j.seps.2022.101378] [PMID: 35966449]
[39]
Z. Wenhua, F. Qamar, T.A.N. Abdali, R. Hassan, S.T.A. Jafri, and Q.N. Nguyen, "Blockchain technology: Security issues, healthcare applications, challenges and future trends", Electronics, vol. 12, no. 3, p. 546, 2023.
[http://dx.doi.org/10.3390/electronics12030546]
[40]
S. Srivastava, B. Paul, and D. Gupta, "Study of word embeddings for enhanced cyber security named entity recognition", Procedia Comput. Sci., vol. 218, pp. 449-460, 2023.
[http://dx.doi.org/10.1016/j.procs.2023.01.027]
[41]
A.I. Taloba, A. Elhadad, A. Rayan, R.M. Abd El-Aziz, M. Salem, A.A. Alzahrani, F.S. Alharithi, and C. Park, "A blockchain-based hybrid platform for multimedia data processing in IoT-Healthcare", Alex. Eng. J., vol. 65, pp. 263-274, 2023.
[http://dx.doi.org/10.1016/j.aej.2022.09.031]
[42]
A. Heidari, N.J. Navimipour, M.A.J. Jamali, and S. Akbarpour, "A green, secure, and deep intelligent method for dynamic IoT-edge-cloud offloading scenarios", SUSCOM, vol. 38, p. 100859, 2023.
[http://dx.doi.org/10.1016/j.suscom.2023.100859]
[43]
P.D. Singh, R. Kaur, G. Dhiman, and G.R. Bojja, "BOSS : A new QoS aware blockchain assisted framework for secure and smart healthcare as a service", Expert Syst., vol. 40, no. 4, p. e12838, 2023.
[http://dx.doi.org/10.1111/exsy.12838]
[44]
N. Berros, F. El Mendili, Y. Filaly, and Y. El Bouzekri El Idrissi, "Enhancing digital health services with big data analytics", Big Data Cogn. Comput., vol. 7, no. 2, p. 64, 2023.
[45]
M.J. Baucas, P. Spachos, and K.N. Plataniotis, "Federated learning and blockchain-enabled fog-IoT platform for wearables in predictive healthcare", IEEE Trans. Comput. Soc. Syst., vol. 10, no. 4, pp. 1732-1741, 2023.
[http://dx.doi.org/10.1109/TCSS.2023.3235950]
[46]
S.K. Patel, "Attack detection and mitigation scheme through novel authentication model enabled optimized neural network in smart healthcare", Comput. Methods Biomech. Biomed. Engin., vol. 26, no. 1, pp. 38-64, 2023.
[http://dx.doi.org/10.1080/10255842.2022.2045585] [PMID: 35243937]
[47]
H.D. Zubaydi, P. Varga, and S. Molnár, "Leveraging blockchain technology for ensuring security and privacy aspects in internet of things: A systematic literature review", Sensors, vol. 23, no. 2, p. 788, 2023.
[http://dx.doi.org/10.3390/s23020788] [PMID: 36679582]
[48]
J. Li, D. Han, Z. Wu, J. Wang, K.C. Li, and A. Castiglione, "A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control", Future Gener. Comput. Syst., vol. 142, pp. 195-211, 2023.
[http://dx.doi.org/10.1016/j.future.2022.12.037]
[49]
D. Srivastava, H. Pandey, and A.K. Agarwal, "Complex predictive analysis for health care: A comprehensive review", Bull. Electr. Eng. Inform., vol. 12, no. 1, pp. 521-531, 2023.
[http://dx.doi.org/10.11591/eei.v12i1.4373]
[50]
A. Bourechak, O. Zedadra, M.N. Kouahla, A. Guerrieri, H. Seridi, and G. Fortino, "At the confluence of artificial intelligence and edge computing in iot-based applications: A review and new perspectives", Sensors, vol. 23, no. 3, p. 1639, 2023.
[http://dx.doi.org/10.3390/s23031639] [PMID: 36772680]
[51]
T.N. Nguyen, and P. Nielsen, "The dynamics of information system development in developing countries: From mutual exclusion to hybrid vigor", Electron. J. Inf. Syst. Dev. Ctries., vol. 89, no. 4, p. e12266, 2023.
[http://dx.doi.org/10.1002/isd2.12266]
[52]
S.G.S. Manoharan, R. Subramaniam, and S. Mohapatra, "Organizational governance through dataplex", In: Enabling Strategic Decision-Making in Organizations Through Dataplex., Emerald Publishing Limited, 2023, pp. 105-129.
[http://dx.doi.org/10.1108/978-1-80455-051-920231012]
[53]
T. Hovorushchenko, A. Moskalenko, and V. Osyadlyi, "Methods of medical data management based on blockchain technologies", J. Reliab. Intell. Environ., vol. 9, no. 1, pp. 5-16, 2023.
[http://dx.doi.org/10.1007/s40860-022-00178-1] [PMID: 35646514]
[54]
T. Shakeel, S. Habib, W. Boulila, A. Koubaa, A. R. Javed, M. Rizwan, and M. Sufiyan, "A survey on COVID-19 impact in the healthcare domain: worldwide market implementation, applications, security and privacy issues, challenges and future prospects", Complex Intell Syst., vol. 9, no. 1, pp. 1027-1058, 2023.
[55]
A. Mohamed, L. Abualigah, A. Alburaikan, and H.A.E.W. Khalifa, "AOEHO: A new hybrid data replication method in fog computing for IoT application", Sensors, vol. 23, no. 4, p. 2189, 2023.
[http://dx.doi.org/10.3390/s23042189] [PMID: 36850784]
[56]
B.D. Deebak, and F. Al-Turjman, "Secure-user sign-in authentication for IoT-based eHealth systems", Complex Intell Syst, vol. 9, no. 3, pp. 2629-2649, 2023.
[http://dx.doi.org/10.1007/s40747-020-00231-7]
[57]
D. Khanna, N. Jindal, H. Singh, and P.S. Rana, "Applications and challenges in healthcare big data: A strategic review", Curr. Med. Imaging Rev., vol. 19, no. 1, pp. 27-36, 2023.
[http://dx.doi.org/10.2174/1573405618666220308113707] [PMID: 35260061]
[58]
Y. Himeur, M. Elnour, F. Fadli, N. Meskin, I. Petri, Y. Rezgui, F. Bensaali, and A. Amira, "AI-big data analytics for building automation and management systems: A survey, actual challenges and future perspectives", Artif. Intell. Rev., vol. 56, no. 6, pp. 4929-5021, 2023.
[http://dx.doi.org/10.1007/s10462-022-10286-2] [PMID: 36268476]
[59]
K. Munjal, and R. Bhatia, "A systematic review of homomorphic encryption and its contributions in healthcare industry", Complex Intell Syst, vol. 9, no. 4, pp. 1-28, 2022.
[PMID: 35531323]
[60]
R. Praveen, and P. Pabitha, "A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications", J. Intell. Fuzzy Syst., vol. 44, no. 5, pp. 7523-7542, 2023.
[http://dx.doi.org/10.3233/JIFS-223617]
[61]
A. Haleem, M. Javaid, R. Pratap Singh, and R. Suman, "Exploring the revolution in healthcare systems through the applications of digital twin technology", Biomedical Technology, vol. 4, pp. 28-38, 2023.
[http://dx.doi.org/10.1016/j.bmt.2023.02.001]
[62]
F.A. Almalki, S.H. Alsamhi, R. Sahal, J. Hassan, A. Hawbani, N.S. Rajput, A. Saif, J. Morgan, and J. Breslin, "Green IoT for eco-friendly and sustainable smart cities: Future directions and opportunities", Mob. Netw. Appl., vol. 28, no. 1, pp. 178-202, 2023.
[http://dx.doi.org/10.1007/s11036-021-01790-w]
[63]
R. Goyal, N. Mittal, L. Gupta, and A. Surana, "Routing protocols in wireless body area networks: Architecture, challenges, and classification", Wirel. Commun. Mob. Comput., vol. 2023, pp. 1-19, 2023.
[http://dx.doi.org/10.1155/2023/9229297]
[64]
S.O. Ajakwe, C.I. Nwakanma, D.S. Kim, and J.M. Lee, "Key wearable device technologies parameters for innovative healthcare delivery in B5G network: A review", IEEE Access, vol. 10, pp. 49956-49974, 2022.
[http://dx.doi.org/10.1109/ACCESS.2022.3173643]
[65]
R. Ahmad, R. Wazirali, and T. Abu-Ain, "Machine learning for wireless sensor networks security: An overview of challenges and issues", Sensors, vol. 22, no. 13, p. 4730, 2022.
[http://dx.doi.org/10.3390/s22134730] [PMID: 35808227]
[66]
A. Rehman, S. Abbas, M.A. Khan, T.M. Ghazal, K.M. Adnan, and A. Mosavi, "A secure healthcare 5.0 system based on blockchain technology entangled with federated learning technique", Comput. Biol. Med., vol. 150, p. 106019, 2022.
[http://dx.doi.org/10.1016/j.compbiomed.2022.106019] [PMID: 36162198]
[67]
A.H. Almulihi, F. Alassery, A.I. Khan, S. Shukla, B.K. Gupta, and R. Kumar, "Analyzing the implications of healthcare data breaches through computational technique", Intell. Autom. Soft Comput., vol. 32, no. 3, pp. 1763-1779, 2022.
[68]
A.H. Sodhro, A.I. Awad, J. van de Beek, and G. Nikolakopoulos, "Intelligent authentication of 5G healthcare devices: A survey", IoT, vol. 20, p. 100610, 2022.
[69]
Z. Zulkifl, F. Khan, S. Tahir, M. Afzal, W. Iqbal, A. Rehman, S. Saeed, and A.M. Almuhaideb, "FBASHI: Fuzzy and blockchain-based adaptive security for healthcare IoTs", IEEE Access, vol. 10, pp. 15644-15656, 2022.
[http://dx.doi.org/10.1109/ACCESS.2022.3149046]
[70]
M.A. Almaiah, F. Hajjej, A. Ali, M.F. Pasha, and O. Almomani, "A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS", Sensors, vol. 22, no. 4, p. 1448, 2022.
[http://dx.doi.org/10.3390/s22041448] [PMID: 35214350]
[71]
G. Dhiman, S. Juneja, H. Mohafez, I. El-Bayoumy, L.K. Sharma, M. Hadizadeh, M.A. Islam, W. Viriyasitavat, and M.U. Khandaker, "Federated learning approach to protect healthcare data over big data scenario", Sustainability, vol. 14, no. 5, p. 2500, 2022.
[http://dx.doi.org/10.3390/su14052500]
[72]
X. Gou, H. Liu, Y. Qiang, Z. Lang, H. Wang, D. Ye, Z. Wang, and H. Wang, "In-depth analysis on safety and security research based on system dynamics: A bibliometric mapping approach-based study", Saf. Sci., vol. 147, p. 105617, 2022.
[http://dx.doi.org/10.1016/j.ssci.2021.105617]
[73]
R. Gopi, P. Muthusamy, P. Suresh, C.G. Gabriel Santhosh Kumar, I.V. Pustokhina, D.A. Pustokhin, and K. Shankar, "Optimal confidential mechanisms in smart city healthcare", Comput. Mater. Continua, vol. 70, no. 3, 2022.
[http://dx.doi.org/10.32604/cmc.2022.019442]
[74]
M. Rahouti, K. Xiong, Y. Xin, S.K. Jagatheesaperumal, M. Ayyash, and M. Shaheed, "SDN security review: Threat taxonomy, implications, and open challenges", IEEE Access, vol. 10, pp. 45820-45854, 2022.
[http://dx.doi.org/10.1109/ACCESS.2022.3168972]
[75]
J.S. Marwaha, A.B. Landman, G.A. Brat, T. Dunn, and W.J. Gordon, "Deploying digital health tools within large, complex health systems: Key considerations for adoption and implementation", NPJ Digit. Med., vol. 5, no. 1, p. 13, 2022.
[http://dx.doi.org/10.1038/s41746-022-00557-1] [PMID: 35087160]
[76]
G. Qiao, S. Leng, S. Maharjan, Y. Zhang, and N. Ansari, "Deep reinforcement learning for cooperative content caching in vehicular edge computing and networks", IEEE Internet Things J., vol. 7, no. 1, pp. 247-257, 2020.
[http://dx.doi.org/10.1109/JIOT.2019.2945640]
[77]
X. Shen, J. Gao, W. Wu, K. Lyu, M. Li, W. Zhuang, X. Li, and J. Rao, "AI-assisted network-slicing based next-generation wireless networks", IEEE Open J. Veh. Technol., vol. 1, pp. 45-66, 2020.
[http://dx.doi.org/10.1109/OJVT.2020.2965100]
[78]
K. Shaukat, S. Luo, V. Varadharajan, I.A. Hameed, and M. Xu, "A survey on machine learning techniques for cyber security in the last decade", IEEE Access, vol. 8, pp. 222310-222354, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.3041951]
[79]
Z. Yu, J. Hu, G. Min, Z. Zhao, W. Miao, and M.S. Hossain, "Mobility-aware proactive edge caching for connected vehicles using federated learning", IEEE Trans. Intell. Transp. Syst., vol. 22, no. 8, pp. 5341-5351, 2021.
[http://dx.doi.org/10.1109/TITS.2020.3017474]
[80]
R.A. Dziyauddin, D. Niyato, N.C. Luong, A.A.A. Mohd Atan, M.A. Mohd Izhar, M.H. Azmi, and S. Mohd Daud, "Computation offloading and content caching and delivery in Vehicular Edge Network: A survey", Comput. Netw., vol. 197, p. 108228, 2021.
[http://dx.doi.org/10.1016/j.comnet.2021.108228]
[81]
S. Yu, X. Chen, Z. Zhou, X. Gong, and D. Wu, "When deep reinforcement learning meets federated learning: Intelligent multitimescale resource management for multiaccess edge computing in 5G ultradense network", IEEE Internet Things J., vol. 8, no. 4, pp. 2238-2251, 2021.
[http://dx.doi.org/10.1109/JIOT.2020.3026589]
[82]
F.A. Salaht, F. Desprez, and A. Lebre, "An overview of service placement problem in fog and edge computing", ACM Comput. Surv., vol. 53, no. 3, pp. 1-35, 2021.
[CSUR]. [http://dx.doi.org/10.1145/3391196]
[83]
Y. Li, and Q. Liu, "A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments", Energy Rep., vol. 7, pp. 8176-8186, 2021.
[http://dx.doi.org/10.1016/j.egyr.2021.08.126]
[84]
E.S. Ali, M.K. Hasan, R. Hassan, R.A. Saeed, M.B. Hassan, S. Islam, N.S. Nafi, and S. Bevinakoppa, "Machine learning technologies for secure vehicular communication in internet of vehicles: recent advances and applications", Secur. Commun. Netw., vol. 2021, pp. 1-23, 2021.
[http://dx.doi.org/10.1155/2021/8868355]
[85]
H.S. Lallie, L.A. Shepherd, J.R.C. Nurse, A. Erola, G. Epiphaniou, C. Maple, and X. Bellekens, "Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic", Comput. Secur., vol. 105, p. 102248, 2021.
[http://dx.doi.org/10.1016/j.cose.2021.102248] [PMID: 36540648]
[86]
A. Khraisat, and A. Alazab, "A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges", Cybersecurity, vol. 4, no. 1, p. 18, 2021.
[http://dx.doi.org/10.1186/s42400-021-00077-7]
[87]
C. Jiang, X. Cheng, H. Gao, X. Zhou, and J. Wan, "Toward computation offloading in edge computing: A survey", IEEE Access, vol. 7, pp. 131543-131558, 2019.
[http://dx.doi.org/10.1109/ACCESS.2019.2938660]
[88]
B.D. Deebak, and F. Al-Turjman, "A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks", Ad Hoc Netw., vol. 97, p. 102022, 2020.
[http://dx.doi.org/10.1016/j.adhoc.2019.102022]
[89]
M. Mehrabi, D. You, V. Latzko, H. Salah, M. Reisslein, and F.H.P. Fitzek, "Device-enhanced MEC: Multi-access edge computing (MEC) aided by end device computation and caching: A survey", IEEE Access, vol. 7, pp. 166079-166108, 2019.
[http://dx.doi.org/10.1109/ACCESS.2019.2953172]
[90]
J.H. Cho, D.P. Sharma, H. Alavizadeh, S. Yoon, N. Ben-Asher, T.J. Moore, D.S. Kim, H. Lim, and F.F. Nelson, "Toward proactive, adaptive defense: A survey on moving target defense", IEEE Commun. Surv. Tutor., vol. 22, no. 1, pp. 709-745, 2020.
[http://dx.doi.org/10.1109/COMST.2019.2963791]
[91]
E. Ismagilova, L. Hughes, N.P. Rana, and Y.K. Dwivedi, "Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework", Inf. Syst. Front., vol. 24, pp. 393-414, 2020.
[PMID: 32837262]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy