From: TACRM: trust access control and resource management mechanism in fog computing
Users | Trust value | Trust level | Requested services | ServCAT | Priority level |
---|---|---|---|---|---|
U1 | 3 | 3 | Monitoring (20 Gb) | H | MP |
U2 | 2 | 2 | Mission critical (95CPU) | H | HP |
U3 | 2.5 | 3 | Conversational video (live streaming) (2 Gb) | M | MP |
U4 | 7 | Not trusted | Real time gaming (10 CPU) | – | – |
U5 | 1 | 1 | V2X messages (1 Gb) | L | MP |
U6 | 9 | Not trusted | Interactive gaming (4 Gb and 5CPU) | – | – |
U7 | 4 | 4 | Chat (76 Gb) | L | LP |
U8 | 5 | Not trusted | Conversational voice (3 Gb) | – | – |
U9 | 1.5 | 2 | Internet, e-mail, (100 Gb) | M | MP |
U10 | 0.7 | 1 | ftp (120 Gb) | M | HP |