{"title":"Comprehensive survey on resource allocation for edge-computing-enabled metaverse","authors":"Tanmay Baidya, Sangman Moh","doi":"10.1016/j.cosrev.2024.100680","DOIUrl":"10.1016/j.cosrev.2024.100680","url":null,"abstract":"<div><p>With the rapid evaluation of virtual and augmented reality, massive Internet of Things networks and upcoming 6 G communication give rise to an emerging concept termed the “metaverse,” which promises to revolutionize how we interact with the digital world by offering immersive experiences between reality and virtuality. Edge computing, another novel paradigm, propels the metaverse functionality by enhancing real-time interaction and reducing latency, providing a responsive and seamless virtual environment. However, realizing the full potential of the metaverse requires dynamic and efficient resource-allocation strategies to handle the immense demand for communicational, computational, and storage resources required by its diverse applications. This survey comprehensively explores resource-allocation strategies in the context of an edge-computing-enabled metaverse, investigating various challenges, existing techniques, and emerging trends in this rapidly expanding field. We first explore the underlying metaverse characteristics and pivotal role of edge computing, after which we investigate various types of resources and their key issues and challenges. We also provide a brief discussion on offloading and caching strategies, which are the most prominent research issues in this context. In this study, we compare and analyze 35 different resource-allocation strategies, benchmark 19 algorithms, and investigate their suitability across diverse metaverse scenarios, offering a broader scope than existing surveys. The survey aims to serve as a comprehensive guide for researchers and practitioners, helping them navigate the complexities of resource allocation in the metaverse and supporting the development of more efficient, scalable, and user-centric virtual environments.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges","authors":"Ponnuru Raveendra Babu , Sathish A.P. Kumar , Alavalapati Goutham Reddy , Ashok Kumar Das","doi":"10.1016/j.cosrev.2024.100676","DOIUrl":"10.1016/j.cosrev.2024.100676","url":null,"abstract":"<div><p>This study provides an in-depth survey of quantum secure authentication and key agreement protocols, investigating the dynamic landscape of cryptographic techniques within the realm of quantum computing. With the potential threat posed by quantum computing advancements to classical cryptographic protocols, the exploration of secure authentication and key agreement in the quantum era becomes imperative for safeguarding communication systems. The research scrutinizes evolving methodologies and innovations designed to enhance the security of authentication processes and key agreements in the context of quantum computing. A comprehensive examination of existing protocols is conducted, elucidating their strengths, limitations, and potential vulnerabilities. The research includes a comparative assessment of security features and computational burdens associated with various quantum secure authentication and key agreement protocols. The survey concludes by underscoring the urgent need for further research in the development of secure and efficient quantum cloud computing environments, as well as lightweight post-quantum cryptographic primitives, to ensure the viability of quantum secure authentication protocols on a universal scale. This comprehensive overview serves as a valuable resource for researchers, practitioners, and policymakers in the rapidly evolving field of quantum secure communication.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142094794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain","authors":"Wajid Rafique , Junaid Qadir","doi":"10.1016/j.cosrev.2024.100678","DOIUrl":"10.1016/j.cosrev.2024.100678","url":null,"abstract":"<div><p>The Metaverse is an evolving technology that leverages the Internet infrastructure and the massively connected Internet of Everything (IoE) to create an immersive virtual world. In the Metaverse, humans engage in activities similar to those in the real world, such as socializing, working, attending events, exploring virtual landscapes, creating and trading digital assets, participating in virtual economies, and experiencing entertainment and cultural activities. By using advanced technologies such as IoE, extended reality (XR), artificial intelligence (AI), machine learning (ML), and 6G communication, along with blockchain technology, the Metaverse bridges the physical and virtual worlds. In particular, <em>Blockchain-Enabled IoE</em> (BIoE) will play a crucial role in Metaverse applications by ensuring secure service provisioning through the integration of blockchain with IoE. It efficiently manages the massive connectivity of physical world objects and enhances security, integrity, and decentralization of trust, while increasing resilience against failures, thus securing and fostering trust in both physical and virtual Metaverse networks. While some view the Metaverse as a detached virtual world, technologies like mixed reality and digital twins highlight the need for complementarity and interactive co-existence between the physical and virtual worlds. Blockchain facilitates this co-existence by providing a secure and trusted framework for integrating and synchronizing data and activities across both environments, developing trust through the reliability and authenticity of interactions and transactions. However, despite substantial advancements in related fields, there remains a significant gap in comprehensive surveys that address the integration of AI/ML, 6G, and blockchain in the Metaverse. In this paper, we fill this gap by examining BIoE’s capabilities in bridging the physical and virtual worlds and securing Metaverse applications across various domains, such as immersive energy grids, immersive healthcare, and immersive living. We explore BIoE’s role in service provisioning in the Metaverse, including access control, privacy protection, authentication, attack identification, and trust management. Additionally, we present a detailed taxonomy of existing literature, discuss novel use cases, and explore the synergies and practical implementations of BIoE in Metaverse applications. Finally, we address current challenges and propose future research directions to advance the field of BIoE in the Metaverse.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142094659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis","authors":"Rajat Chakraborty, Ruchira Naskar","doi":"10.1016/j.cosrev.2024.100677","DOIUrl":"10.1016/j.cosrev.2024.100677","url":null,"abstract":"<div><p>AI based multimedia content generation, already having achieved hyper-realism, deeply influences human perception and trust. Since emerging around late 2017, deepfake technology has rapidly gained popularity due to its diverse applications, raising significant concerns regarding its malicious and unethical use. Although many deepfake detectors have been developed by forensic researchers in recent years, there is an urgent need for robust detectors that can overcome demographic, social, and cultural barriers in identifying deepfakes. To identify a human as a human, to distinguish a person from a synthetic entity, the literature faces compelling necessity to introduce deepfake detectors that can withstand all forms of demographic and social biases. (Multiple researches have been conducted in recent times to prove the existence of social and demographic biases in synthetic media detectors.) In this article, we examine human physiological signals as the foundation for robust deepfake detectors, and present a survey of recent developments in deepfake detection research that relies on human physiological signals and facial biomechanics. We perform in-depth analysis of the techniques to understand the contribution of human physiology in deepfake detection. Hence, we comprehend how human physiology based deepfake detectors fare by exploiting the inherent robustness of physiological signals, in contrast to other existing detectors.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142094795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A systematic literature review on chaotic maps-based image security techniques","authors":"Dilbag Singh , Sharanpreet Kaur , Mandeep Kaur , Surender Singh , Manjit Kaur , Heung-No Lee","doi":"10.1016/j.cosrev.2024.100659","DOIUrl":"10.1016/j.cosrev.2024.100659","url":null,"abstract":"<div><p>Images play a substantial role in various applications such as medical imaging, satellite imaging, and military communications. These images often contain confidential and sensitive information, and are typically transmitted over public networks. As a result, they are vulnerable to various security threats. Therefore, efficient image security techniques are necessary to protect these images from unauthorized access and modification. This paper aims to present a systematic study of chaotic map-based image security techniques. Due to poor selection criteria, existing studies on image security techniques suffer from high overlap among the reviewed methods. Moreover, these reviews often lack depth and cover a limited number of articles. In this paper, we study three well-known chaotic map-based image security models: image encryption, image steganography, and image watermarking. Articles were selected from reputable databases such as IEEE Xplore, Scopus, and Web of Science (WOS). This paper provides a systematic analysis of the fundamental concepts, performance metrics, and security aspects of chaotic map-based image security techniques. Comparisons are drawn among the existing techniques to evaluate their relative strengths. From this extensive review, various issues associated with the current chaotic map-based image security techniques are highlighted. Finally, future directions in the field of chaotic map-based image security are discussed, which can guide researchers in their future work.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142075949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hazy to hazy free: A comprehensive survey of multi-image, single-image, and CNN-based algorithms for dehazing","authors":"Jehoiada Jackson , Kwame Obour Agyekum , kwabena Sarpong , Chiagoziem Ukwuoma , Rutherford Patamia , Zhiguang Qin","doi":"10.1016/j.cosrev.2024.100669","DOIUrl":"10.1016/j.cosrev.2024.100669","url":null,"abstract":"<div><p>The natural and artificial dispersal of climatic particles transforms images obtained in open-air conditions. Due to visibility diminishing aerosols, unfavorable climate situations such as mist, fog, and haze cause color change and reduce the contrast of the obtained image. Images seem deformed and inadequate in contrast saturation, affecting computer vision techniques considerably. Haze removal aims to decrease uncertainty inside a hazy image and enhance the visual effects for post-processing applications. However, dehazing is highly challenging due to its mathematical obscurity. This paper reviews the primary algorithms for image dehazing proposed over the past decade. The paper presents the basis for hazy image degradation, followed by a novel classification of dehazing algorithms into enhancement-based, joint-based, and Image repair methods. All techniques are evaluated, and the respective subsections are presented according to their attributes. Next, we categorize and elaborate on the various quality assessment methods using structural similarity index measure(SSIM), haze result, PSNR, and degradation score to evaluate some unique algorithms. Ultimately, some concerns about drawbacks and future research scope in haze removal methods are examined.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142076002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manzoor Ahmed , Salman Raza , Aized Amin Soofi , Feroz Khan , Wali Ullah Khan , Fang Xu , Symeon Chatzinotas , Octavia A. Dobre , Zhu Han
{"title":"A survey on reconfigurable intelligent surfaces assisted multi-access edge computing networks: State of the art and future challenges","authors":"Manzoor Ahmed , Salman Raza , Aized Amin Soofi , Feroz Khan , Wali Ullah Khan , Fang Xu , Symeon Chatzinotas , Octavia A. Dobre , Zhu Han","doi":"10.1016/j.cosrev.2024.100668","DOIUrl":"10.1016/j.cosrev.2024.100668","url":null,"abstract":"<div><p>This survey provides a comprehensive analysis of the integration of Reconfigurable Intelligent Surfaces (RIS) with edge computing, underscoring RIS’s critical role in advancing wireless communication networks. The examination begins by demystifying edge computing, contrasting it with traditional cloud computing, and categorizing it into several types. It further delves into advanced edge computing models like Multi-Access Edge Computing (MEC), Vehicle Fog Computing (VFC), and Vehicle Edge Computing (VEC) and challenges. Progressing deeper, the survey explores RIS technology, categorizing it into passive, active, and hybrid RIS, and offers an in-depth analysis of Beyond Diagonal RIS (BD-RIS), including reflective, transmissive, and Simultaneous Transmit and Reflect (STAR) modes. Subsequently, the study assesses RIS’s applications within edge computing, revealing its diverse use cases and strategies for performance analysis. The discussion comprises how RIS-driven computation can elevate rates, reduce latency, and contribute to an eco-friendly edge computing approach through better Energy Efficiency (EE). The survey also scrutinizes RIS’s role in bolstering security within edge computing. To aid comprehension, each subsection is complemented by summary tables that meticulously elaborate on, compare, and evaluate the literature, focusing on aspects like system models, scenarios, RIS details, Channel State Information (CSI), offloading types, employed schemes, methodologies, and proposed solutions. This organized approach ensures a cohesive and thorough exploration of the survey’s diverse topics. By illustrating the synergy between RIS and edge computing, the study provides valuable insights or lessons learned for enhancing wireless networks, paving the way for future breakthroughs in communication technologies. Before conclusion, the survey also identifies ongoing challenges and future research directions in RIS-assisted edge computing, emphasizing the vast potential of this field.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142076003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of blockchain, artificial intelligence, and edge computing for Web 3.0","authors":"Jianjun Zhu, Fan Li, Jinyuan Chen","doi":"10.1016/j.cosrev.2024.100667","DOIUrl":"10.1016/j.cosrev.2024.100667","url":null,"abstract":"<div><p>Web 3.0, as the third generation of the World Wide Web, aims to solve contemporary problems of trust, centralization, and data ownership. Driven by the latest advances in cutting-edge technologies, Web 3.0 is moving towards a more open, decentralized, intelligent, and interconnected network. Currently, increasingly widespread data breaches have raised awareness of online privacy and security of personal data. Additionally, since Web 3.0 is a complex integration, the technical details are not as clear as the characteristics it presents. In this survey, we conduct an in-depth exploration of Web 3.0 from the perspectives of blockchain, artificial intelligence, and edge computing. The methodology includes a comprehensive literature review, using specific keywords to identify relevant studies and applying strict inclusion and exclusion criteria to ensure a focus on high-quality literature. The main contributions include identifying the key challenges of Web 3.0, examining the fundamental role of each underlying technology, and surveying state-of-the-art practical applications within this ecosystem. Moreover, we introduce an innovative decentralized storage solution that facilitates secure communication and data processing without relying on centralized servers. We also introduce a novel decentralized computing solution that enhances the capabilities of Web 3.0 by enabling edge devices to perform data analysis locally, reducing dependence on traditional centralized servers. Finally, we highlight key challenges and potential research directions. Through the combination and mutual complementation of multiple technologies, Web 3.0 is expected to give users more control and ownership of data and digital assets.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142058577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kamal Taha , Paul D. Yoo , Chan Yeun , Dirar Homouz , Aya Taha
{"title":"A comprehensive survey of text classification techniques and their research applications: Observational and experimental insights","authors":"Kamal Taha , Paul D. Yoo , Chan Yeun , Dirar Homouz , Aya Taha","doi":"10.1016/j.cosrev.2024.100664","DOIUrl":"10.1016/j.cosrev.2024.100664","url":null,"abstract":"<div><p>The exponential growth of textual data presents substantial challenges in management and analysis, notably due to high storage and processing costs. Text classification, a vital aspect of text mining, provides robust solutions by enabling efficient categorization and organization of text data. These techniques allow individuals, researchers, and businesses to derive meaningful patterns and insights from large volumes of text. This survey paper introduces a comprehensive taxonomy specifically designed for text classification based on research fields. The taxonomy is structured into hierarchical levels: research field-based category, research field-based sub-category, methodology-based technique, methodology sub-technique, and research field applications. We employ a dual evaluation approach: empirical and experimental. Empirically, we assess text classification techniques across four critical criteria. Experimentally, we compare and rank the methodology sub-techniques within the same methodology technique and within the same overall research field sub-category. This structured taxonomy, coupled with thorough evaluations, provides a detailed and nuanced understanding of text classification algorithms and their applications, empowering researchers to make informed decisions based on precise, field-specific insights.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574013724000480/pdfft?md5=d276b7a8b6796ecd0218ecd68c33f3ff&pid=1-s2.0-S1574013724000480-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142045873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives","authors":"Deepak Adhikari , Wei Jiang , Jinyu Zhan , Danda B. Rawat , Asmita Bhattarai","doi":"10.1016/j.cosrev.2024.100665","DOIUrl":"10.1016/j.cosrev.2024.100665","url":null,"abstract":"<div><p>This paper provides a comprehensive survey of anomaly detection for the Internet of Things (IoT). Anomaly detection poses numerous challenges in IoT, with broad applications, including intrusion detection, fraud monitoring, cybersecurity, industrial automation, etc. Intensive attention has been received by network security analytics and researchers, particularly on anomaly detection in the network, deliberately crucial in network security. It is of critical importance to detect network anomalies timely. Due to various issues and resource-constrained features, conventional anomaly detection strategies cannot be implemented in the IoT. Hence, this paper attempts to highlight various recent techniques to detect anomalies in IoT and its applications. We also present anomalies at multiple layers of the IoT architecture. In addition, we discuss multiple computing platforms and highlight various challenges of anomaly detection. Finally, the potential future directions of the methods are suggested, leading to various open research issues to be analyzed afterward. With this survey, we hope that readers can get a better understanding of anomaly detection, as well as research trends in this domain.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":13.3,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142044588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}