Fmec Modeling & Security Issues Assessment Answer



Significance of the research

This research is important as it provide an insight on the subject of FMEC Modeling and Security Issues. Cloud computing has established itself as the alternative to the information technology (Abrahams & Bacon, 2011). In this research it will show how the cloud computing offers services as well as virtually unlimited resources to the users. Nonetheless, there are issues which have been exhibited in the use of these applications (Abrahams & Bacon, 2011). There have been delays in the sensitive applications which encounter the issue of latency particularly in the smart devices and objects they are getting involved in the human life for instance the internet of things.

FMEC is sustainable as well as innovative mobile networking framework to which allows the offloading to the cloud services and resources to the edge of the mobile cellular networks to be able to provide the high bandwidth as well as ultra-low latency (Alonso-Monsalve, García-Carballeira & Calderón, 2017). To handle on the several dynamically there are several security services to the customers of the mobile requirements effectively that is the crucial problem which prevents the progression of the FMEC (Alonso-Monsalve, García-Carballeira & Calderón, 2017). This study address on the issue in which there is certainly a larger need to the mobile networks services because of the increase in the volume of the mobile traffic which could not accommodate on the conventional infrastructure to the mobile (Alonso-Monsalve, García-Carballeira & Calderón, 2017). The research looks at how to overcome this issue, through the introduction of the FMEC which has been introduced to the sustainable and innovative framework (Bierzynski, Escobar & Eberl, 2017). The concept of the FMEC could put the cloud computing capabilities which are the resources as well as services that are within the access network (Bierzynski, Escobar & Eberl, 2017). This proximity to the mobile users, offers direct access to the available resources and the resources as well as services with the bandwidth as well as ultra-low latency (Bierzynski, Escobar & Eberl, 2017). It shows how FMEC could increase on the response to the services, content as well as application from the network edge and at the same time enrich on the experience of the mobile users (Carrega, Repetto, Gouvas & Zafeiropoulos, 2017). The research would show why there is a need to the mobile traffic due to the increase in the expansion of the mobile network such as FMEC. Thus, the research would show why the FMEC is critical. In this research, it is important since it would discuss on these issues.

How original is the approach

An original research has been presented in this research on the FMEC Modeling & Security Issues. The research discusses on the security issues which are impacting on the cloud computing applications (Abrahams & Bacon, 2011). A lot of effort has been paid attention on the research to discuss on these issues, by finding the research gaps which the other authors in this area of research have not discussed. There has been few research works that has focused on the real time as well as dynamic varying to the security services in identifying on the various security needs to the FMEC which has been done (Carrega, Repetto, Gouvas & Zafeiropoulos, 2017). Some of the work done has been by Kanghyo Lee et al. has discussed on the numerous privacy as well as guard issues in the FMEC to the context of the cloud based internet of Things environment (Castilho, Godoy, Castilho & Salmen, 2017). Within this discussion it offered the categorization to the various security technologies in solidifying the numerous network elements for example the Fog nodes and the communication between the fog nodes (Elhadj, 2017). There is certainly minor study done in this subject just a few authors have completed certain research on the security problems to the FMEC to the context to the other technologies for example wireless sensor network,  smart traffic, along with the smart grid (Elhadj, 2017). There are other similar researches such as discussion on the security needs and the challenges to the mobile edge computing (Elhadj, 2017). The researches usually offer on the privacy as well as security implications to the FMEC so they usually do not provide adequate solutions to relieving on the security concerns and problems considering the collaboration to the mobile edge computing with a few of the other technologies such as software-defined networking (Elhadj, 2017). Consequently, in this research it is original work because it would certainly bring in a revolutionary method to the security service selection in order to choose on the optimal security services according to the mobile users requirements particularly in FMEC environment (Elhadj, 2017). It is also vital that you note when one is selecting the optimal security services amongst the many available security services to the overlapping functionalities which are offered out depending on the numerous Quality of the services parameters such as the processing holdup as well as the CPU usage (Rimal, Van & Maier, 2017). This research has not been done before since there has been inadequate research in this topic and not many authors have exhausted the research in this field. Therefore, this research would form a basis to discuss FMEC modeling and the security issue which might arise in the mobile computing.

Literature review

Cloud computing developed to becoming the integral part to the enhanced functions and services that are carried out in both the business environment and also individual users (Alonso-Monsalve, García-Carballeira & Calderón, 2018). With the increase in the use and expansion of cloud computing , there has been functionality issues which started to take place for example incapability to meeting the requirements during low latency and mobility support (Alonso-Monsalve, García-Carballeira & Calderón, 2018) . To have the ability to handle these types of concerns specialized disciplines this really is regarded as Fog and Mobile Edge Computing- FMEC which has been developed. There have been numerous researches which have been recently done in the section of FMEC which has offered the cloud users to have a close link up with the services. Nonetheless, there have been types of modeling and security issues which are present in FMEC services. It is important to have some ideas in regards to these issues to ensure that the services which are offered are safe and also secure to the users (Alonso-Monsalve, García-Carballeira & Calderón, 2018).

Cloud computing continues to be long thought to be the cornerstones to the future internet systems , which has been due to the ability to accommodate the computational as well as storage case power to the mobile and computing devices (Rimal, Van & Maier, 2017). The major disadvantage that has recently been associated to the cloud computing generally originate from its centralized nature, that avoids it from providing reasonable times , mobility support or perhaps being aware to the context of the users (Rimal, Van & Maier, 2017). This normally continues to be encouraged by the emergence to the Edge Computing paradigms , similar to the cloud particularly in the sense that provide the computation as well as storage capabilities to be placed to the end users, particularly to in which the data has being generated (Rimal, Van & Maier, 2017). Nonetheless, this method does not necessary imply that obtaining rid to the cloud but instead having multi tier architecture to in which some of the operations might be carried out in a manner that is fashionable through handling them to the nearby edge data centers instead relying upon the distant cloud server which are at the backbone (Rimal, Van & Maier, 2017).
The fog computing is certainly one example to the Edge Computing ecosystem (Rimal, Van & Maier, 2017). The fog devices usually coexist with the cloud servers and the end users devices that are in the three tier architecture (Rimal, Van & Maier, 2017). The fog nodes usually are heterogeneous devices that are generally geographically distributed so they offer services to the devices which are in the local environment (Rimal, Van & Maier, 2017). It is significant to notice that the Fog infrastructure is certainly not monolithic; instead it is ecosystems wherein you will discover multiple infrastructures which the providers do coexists as well as cooperate with the others (Rimal, Van & Maier, 2017). When it comes to such environment, the fog nodes as well as the services that are deployed to the cloud could belong to the multiple actors especially from the private users to the mobile network operators (Rimal, Van & Maier, 2017). To such cooperative as well as the federated ecosystem enable the users as well as service providers to the benefits from the advantages of the Fog regardless to the locations.

Security especially in the Fog computing is usually a challenge for many reasons. It is important to note that the Fog is the semi-distributed environment which consists of the heterogeneous devices which belong with the different trust domains as well as managed by the entities that have various technological aspects (Carrega, Repetto, Gouvas & Zafeiropoulos, 2017). Moreover, they conjugate with the number of the supporting technologies as well as the scenarios to their own security aspects which includes the numerous communications along with the connectivity protocols, along with the virtualization technologies (Rimal, Van & Maier, 2017). These kind of the enabling technologies need to be secure in the isolation but also integrated to the other technologies which are within the Fog (Rimal, Van & Maier, 2017). Security threats along with the attacks must appear to any level of infrastructure that differs with severity (Rimal, Van & Maier, 2017). The attackers generally target the end users or attacks launched from these kind of the devices they have got a restricted effect, which affect the local environment. Research and analysis are significant to understand these concerns since they offer a deeper knowledge to the FMEC issues to develop measures which are necessary for control.

Research gap

There has been little work which has been carried out in order to protect the Fog infrastructure despite numerous researches existing in regards to the security related aspects in the analogous paradigms particularly in the cloud computing in Mobile (Castilho, Godoy, Castilho & Salmen, 2017).  To most of the research which have existed focused on the authentication and the access control and these research areas has remained to be researched. This research paper would stress the need to transcend the current research on the Fog security considering the needs to the ecosystem while at the same time in which there are multiple trust domains coexist as well as interact with each other (Castilho, Godoy, Castilho & Salmen, 2017). Consequently, through this research it would evaluate the major security services that are essential to reduce on the results to the security threats in the Fog computing (Rimal, Van & Maier, 2017). Furthermore, the research might recognize the literature and add the know-how foundation through analysis of their interdependencies and how you can address them for example the problem of latency. Furthermore, the research would evaluate the present advanced that are related to these services and identify on the areas which has not been explored fully by the authors to ensure that these research gaps have been addressed. The research in FMEC Modeling & Security Issues has some research gaps whereby not many researchers have fully addressed on the security issues in the FMEC modeling (Roca, Quiroga, Valero & Nemirovsky, 2017). Additionally, there are research gaps on solution to these security issues.

Aim of the research

The aim of this study is detailing down the modeling and security concerns that are linked to the FMEC via exploring various areas and domains.

Materials and Methods

The research methodology which has been utilized in this study on the subject FMEC modeling and security issues is qualitative study (Elhadj, 2017). The initial step that is incorporated in the study is preparation of the investigation via listing down analysis question (Castilho, Godoy, Castilho & Salmen, 2017).There has been cloud computing programs which are has been used extensively worldwide (Castilho, Godoy, Castilho & Salmen, 2017). FMEC services have features which they could offer better quality services. Nevertheless these services have been inhibited by problems that are present in it. The research thus, will answer the questions which are around different issues associated to FMEC services.

Many researchers have been carried research on topic for example FMEC services, modeling data in addition to security and the privacy (Castilho, Godoy, Castilho & Salmen, 2017). Literature review of those research functions continues to be undertaken as the second part of the research process (Castilho, Godoy, Castilho & Salmen, 2017). There are several study methodologies which are present and it is essential to come down with methodology applicable to this research. Qualitative technique has been selected as the methodology. The action researches, grounded theory as well as the phenomenology are the measures which are utilized for qualitative technique which are used in the study process (Castilho, Godoy, Castilho & Salmen, 2017). The data collection, data sampling as well as analysis of the data are the methods which are utilized and employed in the study (Roca, Quiroga, Valero & Nemirovsky, 2017). There are research papers; online journals as well as articles which are utilized to collect the data and at the same time gather all the important information

FMEC modeling issues

The FMEC design and architecture has many components that are involved (Castilho, Godoy, Castilho & Salmen, 2017). Edge data centres are generally owned and are usually deployed with the help infrastructure providers that allow the implementation of the multi-tenant virtualization system. The services that are provided by these types of the data centres could hence, be utilized to each of end user present to the entire network or perhaps the channel (Elhadj, 2017). The data centres could function and at the same time continue to be functional on their personal, but will not connect entirely from traditional cloud (Elhadj, 2017). Thus, the hierarchical multitenant designs are developed as an outcome (Elhadj, 2017). Due to the association with mobile programs in addition to presence of traditional cloud, there are many modeling problems that have been encountered with the FMEC services. The issues are associated with type of configuration, connectivity and the integration (Vargo, Wieland & Akaka, 2015). It is as a result of these problems that FMEC serviced have been in their initial expansion stages and not modified fully. The path related to transformation and up-gradation continues to be in progress which creates out numerous modeling issues (Roca, Quiroga, Valero & Nemirovsky, 2017). There is certainly heterogeneous hardware and elements that are used in FMEC models and these have a degree to the mobility that is related to them (Chin, Fan & Haines, 2014). There is certainly decentralization of the FMEC services and they are distributed in nature which welcome numerous security concerns as well as design issues.

FMEC Security Issues

Security has been one of the crucial and important requirements that is presently underway. It is necessary for both services and solutions to make sure security continues to be maintained at each point of time (Roca, Quiroga, Valero & Nemirovsky, 2017). In the event of the FMEC services, there are several security challenges and issues that have been observed and have potential to result in damaging effect to the users (Elhadj, 2017). The security concerns are depending on the network infrastructure which is involved to the FMEC services.
The primary network issue that has been observed is that of the Denial of Service (DoS). These kind of attack would not cause entire breakdown of the FMEC services as it remains functional and either autonomous or even semi-autonomous in nature (Salman, Kayssi, Chehab & Elhajj, 2017). Nonetheless, it could cause a significant effect in regards to the performance of the service that could bring down the experience of the users and at the same time fulfillment level (Gil-Garcia, Helbig & Ojo, 2014). There could possibly be some malicious entities which may capture various section of the network via the techniques for example eavesdropping (Rios, Roman, Onieva & Lopez, 2017). These types of the attacks are thought to be the man in the centre and could particularly damage since it has effect to the elements which are traverse via the nodes that are targeted (Salman, Kayssi, Chehab & Elhajj, 2017).
Another type of the network based attack is rouge gateway attack that attackers launch on their own gateway devices in the networking channels. This type of attack has an equivalent result as that of the middle attacks (Salman, Kayssi, Chehab & Elhajj, 2017). There are numerous security concerns that are related to edge data centres for example the service infrastructure. The fog nodes which are owned by the users are some of the typical physical elements which attackers might capture and at the same time result in certain damage (Dang & Hoang, 2017). The physical problems that are triggered to the FMEC services could possibly bring down the functionality and performance of the all service (Dang & Hoang, 2017). The information which transmits through the fog nodes could be designed for the different insider entities and might be accessed by the entities that are unauthorized whenever breaching security. In most these cases, the data which traverses by the nodes is at a risk (Castilho, Godoy, Castilho & Salmen, 2017). Configuration activities that are carried out with edge data centres are carried out by individuals who are not experts and cannot have adequate training (Dang & Hoang, 2017). Because of this, privileges that are regarded by user might be implemented incorrectly offering an unauthorized user with additional set of the privileges and control to the services putting entire security at risk (Kuhlmann & Ordóñez-Matamoros, 2017). With regards to the advanced form of the security issues which are associated with edge data centres; there may be an event of the rogue data centre that could come up (Fahad, Ahmed & Kahar, 2017). In cases like this, the hacker might succeed in the creation of their very own data centre infrastructure which results in the adverse effect to the security. There are several primary infrastructures which are related to the FMEC services that have their own personal set of the security issues and also issues (Fahad, Ahmed & Kahar, 2017). The information is capable of flow from certainly one of the layer to other. There may be a leakage of the data that might be present.

Apart from the leakage of the data, it could also be manipulated by malevolent entities that might result in the direct impact to the data security of FMEC services (Roca, Quiroga, Valero & Nemirovsky, 2017). There are security issues that are associated with the virtualization infrastructure and are popular to the FMEC services. There could possibly be malicious virtual machine that can be developed by hackers which result to the denial services (Roca, Quiroga, Valero & Nemirovsky, 2017). Furthermore, malicious machines might misuse the resources that are present to the overall flow that results in the negative impact to the all infrastructure. Host system which has been related to the adversary and might be controlled might cause many security threats to virtual machine that are related to the host (Winkler & Gilani, 2011). At the end of the loopholes in the security present at the end of user could result in various issues of security.


There are various building blocks which could result in the formation of the FMEC services (Salman, Kayssi, Chehab & Elhajj, 2017). These types of building blocks incorporate the peer to peer system, distributed systems and the wireless networks. It is essential to be able to guarantee mechanisms of security and protocols have been installed and simultaneously managed in every element and failure could possibly lead to severe security situations that would be observed (Salman, Kayssi, Chehab & Elhajj, 2017). It might not be easy to guarantee of the security to the entire system via making certain there is security of particular part (Roca, Quiroga, Valero & Nemirovsky, 2017). The security problems associated with the FMEC services might be clubbed in categories as the infrastructure, core infrastructure, services infrastructure and virtualization infrastructure.

There are various security concerns as well as issues which are present to every of these categories which should be controlled, at the same time detected and even prevented (Salman, Kayssi, Chehab & Elhajj, 2017). When it comes to the modeling issues and concerns, there are issues which are associated to the connectivity, integration, interoperatibility which has been observed (Salman, Kayssi, Chehab & Elhajj, 2017). The security of PMEC services which could be improved through making usage of the innovative safety protocols to control attack that prevail in every threat categories pointed out above.
The research work which is undertaken on the topic as FMEC modeling and security problems which lead to the following set of the outcomes.
• Brief description of the FMEC services and deep comprehending on the functionalities in addition to requirements (Anderson, 2016).
• Detailed account to the modeling issues that are associated to the FMEC services (Blok & Lemmens, 2015).
• Detailed account to the issues associated with security related to the FMEC services.
Brief account to the measures which are possible and could be taken





Listing on the topic which could be selected as research topic.


Selection of the research topic and justification of the topic


Analysis of the research work down on the modeling and the security issues in the FMEC


Extraction of the relevant data from the analysis of literature


Decision making on research methodology to be utilized and its justification


Collection of the data


Sampling of the data


Analysis of results which were obtained during the week


Listing of the outcomes from the research done within the week.


The presentation of research and results which have been obtained



Cloud computing offers wide range of the services as well as virtually unlimited resources that are available to the users (Rimal, Van & Maier, 2017).  There have been new applications for instance the virtual reality along with the smart buildings control, which have emerged due to the large resources which are available (Rimal, Van & Maier, 2017). Nonetheless, the delay sensitive applications encountered issues such as large latency, particularly when numerous smart devices as well as objects they are getting involved to the human life (Yaseen, Albalas, Jararwah, & Al?Ayyoub, 2018). Thus, cloud computing has been unable to meet on all the requirements associated to the low latency, awareness, along with the aspect of mobility (Yaseen 2018). In order to address these issues there has been addressed through the FMEC in which put the resources and the services to the cloud closer to the users, and this has facilitated and leveraged on the available services and the resources to the edge networks (Yaseen et. al 2018).  As much as these resources help to address on the issue which are associated with the cloud computing there are security issues which have been addressed previously in this discussion it would provide some literature on the same and some control mechanisms to which could help address on them.

It is also important to note that regardless of the body of the study particularly in the security relevant topics particularly in the analogous paradigms, especially in the Mobile cloud computing there have been little study to that has been carried out particularly to protect the Fog infrastructures (Foschini & Girolami, 2017). Many of the research in this field have focused on the authentication and access control, while the aspects of the services have not been explored.  According to Foschini & Girolami (2017) they did propose the preliminary approaches which cloud be used for authentication as well as the authorization especially to the Fog environments without the use of the online cloud server (Rimal, Van & Maier, 2017). In his initial approach, the Cloud service provider generally sends their own credentials to Fog so that it may later authenticate to the users by itself (Castilho, Godoy, Castilho & Salmen, 2017). Due to the shortcomings to this scheme , the authors usually bring in another scheme that are depending on the special type of the Attribute that are based upon the Encryption thought to be the cipher text (Castilho, Godoy, Castilho & Salmen, 2017) . The ciphers usually are connected to the access policies as well as the keys with the attributes. This type of the proposed schemes usually lowers on the latency and the overhead which are introduced by the encryption as well as decryption through securely outsourcing costly to the operations to the Fog nodes (Castilho, Godoy, Castilho & Salmen, 2017). There has been a clear limitation to these kinds of the solutions which have been proposed in that it is only the fog environments to which depend on the single infrastructure providers (Foschini & Girolami, 2017). Additionally, there is another Fog computing which is proposed that enables authentication between the end users as well as the fog nodes (Foschini & Girolami, 2017). When it comes to the end users, they are more required to possess a master key which they usually use to authenticate with any kind of the fog node that are associated to a given  cloud server. Additionally, the protocol usually comprises of three phases. To the initialization phase, the cloud usually sends each of the fog nodes to the unique identifier, which has been signed with its private key.

In this literature it has presented a policy based security framework aimed in supporting secure sharing, collaboration as well as data reuse particularly to the Fog environments. Moreover, Mushunuri, Kattepur, Rath & Simha (2017), proposed on the policy management framework which has been adopted an attribute which is based on the authentication to identify on their users and at the same time verify on whether the attributes of the user entitle them to access on particular resources or the services (Mushunuri, Kattepur, Rath & Simha, 2017). The framework usually consists with a number of the modules to define the rules, storing them as well as making decisions to the users’ services request as well as data migration amongst the numerous fog nodes. Based on the authors the modules could be plugged particularly to the real time as well as policy enforcer modules which could reside either to the fog node, cloud server or perhaps within the end user devices. To address on the issues associated to the FMEC there are tools which cloud be implemented and these have been discussed in the below aspects.

One aspect is through securing the data storages. When it comes to the fog computing the users data has always been outsourced and the control over the data of the users has been handed over the fog node,  and this could introduce on the security threat in the cloud computing as it was discussed in this research (Rimal, Van & Maier, 2017). To ensure there is data integrity there is need to have an auditable data storage services which are in place to the context of the cloud computing in order to protect on the data (Salman, Kayssi, Chehab & Elhajj, 2017). There are techniques such as momorphic encryption as well as searchable encryption which could be combined in order to protect of the integrity, verifiability as well as confidentiality to the cloud storage system which ensures that the client could check on their data which has been stored to the servers that are untrustworthy (Salman, Kayssi, Chehab & Elhajj, 2017).

Another aspect is through securing of the private data computation (Salman, Kayssi, Chehab & Elhajj, 2017). This is a crucial aspect when it comes to the fog computing in order to attain a secure as well as privacy which preserve on the computation which has been outsourced to the fog nodes (Salman, Kayssi, Chehab & Elhajj, 2017). It is crucial to have a verifiable computing which ensures that the computing devices to offload on the computation of the function to some of the other such as un-trusted servers, and at the same time ensuring that maintenance of results that are verifiable has been maintained (Salman, Kayssi, Chehab & Elhajj, 2017). The other server does evaluation on the function and returns the result with the proof that the computation to the function could be carried out much correctly (Yaseen, Albalas, Jararwah & Al?Ayyoub, 2018). When it comes to the fog computing to instill on the confidence to the computation offloaded to the nodes in the fog, the fog users need to have the confidence when it comes to verifying on the correctness to the computation (Yaseen et. al 2018).


Cloud computing continues to be certainly one of the areas that has been research widely. There have been advancement and evolution related to the research carried out. Due to high traffic on cloud performance of numerous programs begun to change. Fog and the Mobile Edge Computing continue to be a discipline that has been to be able to overcome the issues that has been associated with the cloud services (Dang & Hoang, 2017). Nevertheless, there an FMEC service encounters several issues that have been pointed out in the research. Several of the primary issues happen to be observed are in the modeling problems and security concerns. There are several concerns that are in these two areas and have been in accordance with the users thus, it required to find a technique to these problems.
Security continues to be area to which people are experiencing primary changes and transformations with each specific day. There have been numerous security tools and protocols that are present and these needs to be improved in order to could possibly be applied in the FMEC services. This study has been done in the area which has been pointed out and the research has provided concepts that are applied in the development of the problems and issues.


Abrahams, C., & Bacon, J. (2011). Trends and Issues in Postgraduate Medical Education: Inputs,  Outputs and Outcomes. Members of the FMEC (A Paper Commissioned as part of the  Environmental Scan for the Future of Medical Education in Canada Postgraduate  Project) PG consortium, 1-26.

Alonso-Monsalve, S., García-Carballeira, F., & Calderón, A. (2018). A heterogeneous mobile cloud computing model for hybrid clouds. Future Generation Computer Systems.

Alonso-Monsalve, S., García-Carballeira, F., & Calderón, A. (2017, May). Fog computing   through public-resource computing and storage. In Fog and Mobile Edge Computing (FMEC), 2017 Second International Conference on (pp. 81-87). IEEE.

Anderson, T. (2016). Theories for learning with emerging technologies. Emergence and innovation in digital learning: Foundations and applications, 35-50.

Blok, V., & Lemmens, P. (2015). The emerging concept of responsible innovation. Three   reasons why it is questionable and calls for a radical transformation of the concept of  innovation. In Responsible Innovation 2 (pp. 19-35). Springer, Cham.

Bierzynski, K., Escobar, A., & Eberl, M. (2017, May). Cloud, fog and edge: Cooperation for the future?. In Fog and Mobile Edge Computing (FMEC), 2017 Second International    Conference on (pp. 62-67). IEEE.

Castilho, S. D., Godoy, E. P., Castilho, T. W., & Salmen, F. (2017, May). Proposed model to  implement high-level Information Security in Internet of Things. In Fog and Mobile Edge Computing (FMEC), 2017 Second International Conference on (pp. 165-170).    IEEE.

Carrega, A., Repetto, M., Gouvas, P., & Zafeiropoulos, A. (2017). A middleware for mobile  edge computing. IEEE Cloud Computing, 4(4), 26-37.

Chin, W. H., Fan, Z., & Haines, R. (2014). Emerging technologies and research challenges for 5G wireless networks. IEEE Wireless Communications, 21(2), 106-112.

Elhadj, B. (2017). Cloud Security Challenges and Countermeasures: A Systematic Review of  State of the Art.

Fahad, A. M., Ahmed, A. A., & Kahar, M. N. M. (2017, November). The importance of   monitoring cloud computing: An intensive review. In Region 10 Conference, TENCON 2017-2017 IEEE (pp. 2858-2863). IEEE.

Foschini, L., & Girolami, M. (2017). Human-enabled Edge Computing: When Mobile Crowd-  Sensing meets Mobile Edge Computing. MMTC Communications-Frontiers.

Dang, T. D., & Hoang, D. (2017, May). A data protection model for fog computing. In Fog and Mobile Edge Computing (FMEC), 2017 Second International Conference on (pp. 32-38). IEEE.

Gil-Garcia, J. R., Helbig, N., & Ojo, A. (2014). Being smart: Emerging technologies and   innovation in the public sector. Government Information Quarterly, 31, I1-I8.

Kuhlmann, S., & Ordóñez-Matamoros, G. (Eds.). (2017). Research Handbook on Innovation  Governance for Emerging Economies: Towards Better Models. Edward Elgar Publishing.

Mushunuri, V., Kattepur, A., Rath, H. K., & Simha, A. (2017, May). Resource optimization in  fog enabled IoT deployments. In Fog and Mobile Edge Computing (FMEC), 2017   Second International Conference on (pp. 6-13). IEEE.

Rimal, B. P., Van, D. P., & Maier, M. (2017). Mobile-edge computing versus centralized cloud  computing over a converged FiWi access network. IEEE Transactions on Network and  Service Management, 14(3), 498-513.

Rios, R., Roman, R., Onieva, J. A., & Lopez, J. (2017, May). From SMOG to Fog: A security perspective. In Fog and Mobile Edge Computing (FMEC), 2017 Second International    Conference on (pp. 56-61). IEEE.

Roca, D., Quiroga, J. V., Valero, M., & Nemirovsky, M. (2017, May). Fog Function Virtualization: A flexible solution for IoT applications. In Fog and Mobile Edge  Computing (FMEC), 2017 Second International Conference on (pp. 74-80). IEEE.

Salman, O., Kayssi, A., Chehab, A., & Elhajj, I. (2017, May). Multi-level security for the 5G/IoT ubiquitous network. In Fog and Mobile Edge Computing (FMEC), 2017 Second  International Conference on (pp. 188-193). IEEE.

Vargo, S. L., Wieland, H., & Akaka, M. A. (2015). Innovation through institutionalization: A  service ecosystems perspective. Industrial Marketing Management, 44, 63-72.

Winkler, U., & Gilani, W. (2011). Business continuity management of business driven IT landscapes. Handbook of Research on Service-Oriented Systems and Non-Functional Properties: Future Directions: Future Directions, 381.

Yaseen, Q., Albalas, F., Jararwah, Y., & Al?Ayyoub, M. (2018). Leveraging fog computing and   software defined systems for selective forwarding attacks detection in mobile wireless   sensor networks. Transactions on Emerging Telecommunications Technologies, 29(4), e3183.



Upload Document Document Unser Evaluion Get Money Into Your Wallet

Cite This work.

To export a reference to this article please select a referencing stye below.

Assignment Hippo (2023) . Retrive from

"." Assignment Hippo ,2023,

Assignment Hippo (2023) . Available from:

[Accessed 29/01/2023].

Assignment Hippo . ''(Assignment Hippo,2023) accessed 29/01/2023.

Buy Fmec Modeling & Security Issues Assessment Answers Online

Talk to our expert to get the help with Fmec Modeling & Security Issues Assessment Answers from Assignment Hippo Experts to complete your assessment on time and boost your grades now

The main aim/motive of the finance assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignment help Australia. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at are so much skilled, capable, talented, and experienced in their field and use our best and free Citation Generator and cite your writing assignments, so, for this, they can effectively write the best economics assignment help services.

Get Online Support for Fmec Modeling & Security Issues Assessment Answer Assignment Help Online

Want to order fresh copy of the Sample Fmec Modeling & Security Issues Assessment Answers? online or do you need the old solutions for Sample Fmec Modeling & Security Issues Assessment Answer, contact our customer support or talk to us to get the answers of it.

Assignment Help Australia
Want latest solution of this assignment

Want to order fresh copy of the Fmec Modeling & Security Issues Assessment Answers? online or do you need the old solutions for Sample Fmec Modeling & Security Issues Assessment Answer, contact our customer support or talk to us to get the answers of it.

Submit Your Assignment Here

AssignmentHippo Features

On Time Delivery

Our motto is deliver assignment on Time. Our Expert writers deliver quality assignments to the students.

Plagiarism Free Work

Get reliable and unique assignments by using our 100% plagiarism-free.

24 X 7 Live Help

Get connected 24*7 with our Live Chat support executives to receive instant solutions for your assignment.

Services For All Subjects

Get Help with all the subjects like: Programming, Accounting, Finance, Engineering, Law and Marketing.

Best Price Guarantee

Get premium service at a pocket-friendly rate at AssignmentHippo


  • Assignment Writing Guide
  • Essay Writing Guide
  • Dissertation Writing Guide
  • Research Paper Writing Guide


  • Accounts
  • Computer Science
  • Economics
  • Engineering

Client Review

I was struggling so hard to complete my marketing assignment on brand development when I decided to finally reach to the experts of this portal. They certainly deliver perfect consistency and the desired format. The content prepared by the experts of this platform was simply amazing. I definitely owe my grades to them.

Tap to Chat
Get instant assignment help