The Cloud-to-Thing Continuum Opportunities and Challenges in Cloud, Fog and Edge Computing
The Internet of Things offers massive societal and economic opportunities whileat the same time significant challenges, not least the delivery and managementof the technical infrastructure underpinning it, the deluge of data generated fromit, ensuring privacy and security, and capturing value from i...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Cham
Springer International Publishing
2020
Springer International Publishing AG Palgrave Pivot |
| Edition: | 1 |
| Series: | Palgrave Studies in Digital Business & Enabling Technologies |
| Subjects: | |
| ISBN: | 9783030411107, 3030411109, 3030411095, 9783030411091 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- 7.6 Towards a Framework for Examining the Impact of Privacy Disclosures on Privacy Perceptions and Behaviours -- 7.7 Concluding Remarks -- References -- Chapter 8: Mapping the Business Value of the Internet of Things -- 8.1 Introduction -- 8.2 The Internet of Things -- 8.3 A Value Mapping Framework for the Internet of Things -- 8.3.1 Value Creators and Consumers -- 8.3.2 Investment -- 8.3.3 Value Generation and Monetisation -- 8.3.4 Bring It All Together: A Value Mapping Framework for the Internet of Things -- 8.4 Towards a Research Agenda on the Business Value of IoT -- 8.5 Conclusion -- References -- Index
- Intro -- Preface -- Acknowledgement -- Contents -- Notes on Contributors -- Abbreviations -- List of Figures -- List of Tables -- Chapter 1: The Internet of Things: Definitions, Key Concepts, and Reference Architectures -- 1.1 Introduction -- 1.2 Defining the Internet of Things -- 1.3 Key Concepts and Constructs -- 1.4 IoT Reference Architectures -- 1.4.1 Internet of Things Architectural Reference Model (IoT ARM) -- 1.4.2 IEEE Standard for an Architectural Framework for the Internet of Things (P2413) -- 1.4.3 Industrial Internet Reference Architecture (IIRA) -- 1.4.4 WSO2 IoT Reference Architecture (WSO2 IRA) -- 1.5 Intel System Architecture Specifications (Intel SAS) -- 1.5.1 Azure IoT Reference Architecture (Azure IRA) -- 1.5.2 SAT-IoT -- 1.5.3 Summary of Architectural Features -- 1.5.4 Conclusion -- References -- Chapter 2: Next Generation Cloud Architectures -- 2.1 Introduction -- 2.2 Centralized Cloud Computing Model -- 2.2.1 Defining Cloud Computing -- 2.2.2 The Impact of IoT on Conventional Cloud Architectures -- 2.3 Changes to Centralized Cloud Computing Model -- 2.4 Decentralized Cloud Computing Model -- 2.4.1 Fog Computing -- 2.4.2 Mobile Edge Computing -- 2.4.3 Volunteer Computing -- 2.4.4 Serverless Computing -- 2.4.5 Software-Defined Computing -- 2.4.6 Mist Computing -- 2.5 Research Directions and Opportunities -- 2.5.1 Resource Provisioning and Heterogeneous Resources -- 2.5.2 Self-management, Self-organization Approach -- 2.5.3 Separation of Concerns -- 2.6 Conclusion -- References -- Chapter 3: Flying to the Clouds: The Evolution of the 5G Radio Access Networks -- 3.1 Introduction -- 3.2 The Evolution of Radio Access Networks (RANs) -- 3.2.1 Distributed Radio Access Networks -- 3.2.2 Cloud Radio Access Networks (C-RANs) -- 3.2.3 Heterogeneous Cloud Radio Access Networks -- 3.2.4 Fog Computing Radio Access Networks
- 3.3 Network Function Virtualisation and 5G Networks -- 3.4 Challenges and Future Directions -- 3.5 Conclusion -- References -- Chapter 4: Orchestration from the Cloud to the Edge -- 4.1 Introduction -- 4.2 Orchestration Challenges -- 4.3 Industry Standards -- 4.3.1 Network Function Virtualisation -- 4.3.2 OpenFog Reference Architecture -- 4.3.3 Orchestration Architectures -- 4.3.4 Orchestration Tools -- 4.4 Conclusion -- References -- Chapter 5: Living at the Edge? Optimizing availability in IoT -- 5.1 Introduction -- 5.2 Smart Cities -- 5.3 Smart Agriculture -- 5.4 The Internet of Medical Things -- 5.5 Conclusion -- References -- Chapter 6: Security of Distributed Intelligence in Edge Computing: Threats and Countermeasures -- 6.1 Edge Computing: Threats and Challenges -- 6.1.1 DDoS Attack -- 6.1.2 Side-Channel Attacks -- 6.1.3 Malware Injection Attacks -- 6.1.4 Authentication and Authorization Attacks -- 6.2 Edge Intelligence -- 6.2.1 Lightweight Models for Edge AI -- 6.2.2 Data and Model Parallelism -- 6.2.3 Federated Learning -- 6.3 Threats to Edge AI -- 6.3.1 Threats to Edge AI for Inference -- 6.3.2 Evasion Attacks -- 6.3.3 Privacy Attacks -- 6.3.4 Threats to Edge AI for Training -- 6.4 Countering the Threats to Edge AI -- 6.4.1 Defenses against Data Poisoning -- 6.4.2 Countering Adversarial Attacks -- 6.4.3 Hardening Federated Learning Systems -- 6.5 Future Directions -- 6.5.1 Open Issues in Federated Learning -- 6.5.2 Distributed Deep Reinforcement Learning -- 6.6 Conclusion -- References -- Chapter 7: Examining Privacy Disclosure and Trust in the Consumer Internet of Things: An Integrated Research Framework -- 7.1 Introduction -- 7.2 Privacy and the Internet of Things -- 7.3 Trust, Privacy, and the Internet of Things -- 7.4 Approaches for Influencing Perceptions of Privacy and Trust -- 7.5 Privacy Trust Labels: Design Principles

