Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: https://dspace.ncfu.ru/handle/123456789/28695
Название: Reliablity and Security for Fog Computing Systems
Авторы: Shiriaev, E. M.
Ширяев, Е. М.
Bezuglova, E. S.
Безуглова, Е. С.
Lapina, M. A.
Лапина, М. А.
Babenko, M. G.
Бабенко, М. Г.
Ключевые слова: Data security;Fog computing;Distributed computing systems;Fault tolerance;Reliability
Дата публикации: 2024
Издатель: Multidisciplinary Digital Publishing Institute (MDPI)
Библиографическое описание: Shiriaev, E., Ermakova, T., Bezuglova, E., Lapina, M.A., Babenko, M. Reliablity and Security for Fog Computing Systems // Information (Switzerland). - 2024. - 15 (6). - статья № 317. - DOI: 10.3390/info15060317
Источник: Information (Switzerland)
Краткий осмотр (реферат): Fog computing (FC) is a distributed architecture in which computing resources and services are placed on edge devices closer to data sources. This enables more efficient data processing, shorter latency times, and better performance. Fog computing was shown to be a promising solution for addressing the new computing requirements. However, there are still many challenges to overcome to utilize this new computing paradigm, in particular, reliability and security. Following this need, a systematic literature review was conducted to create a list of requirements. As a result, the following four key requirements were formulated: (1) low latency and response times; (2) scalability and resource management; (3) fault tolerance and redundancy; and (4) privacy and security. Low delay and response can be achieved through edge caching, edge real-time analyses and decision making, and mobile edge computing. Scalability and resource management can be enabled by edge federation, virtualization and containerization, and edge resource discovery and orchestration. Fault tolerance and redundancy can be enabled by backup and recovery mechanisms, data replication strategies, and disaster recovery plans, with a residual number system (RNS) being a promising solution. Data security and data privacy are manifested in strong authentication and authorization mechanisms, access control and authorization management, with fully homomorphic encryption (FHE) and the secret sharing system (SSS) being of particular interest.
URI (Унифицированный идентификатор ресурса): https://dspace.ncfu.ru/handle/123456789/28695
Располагается в коллекциях:Статьи, проиндексированные в SCOPUS, WOS

Файлы этого ресурса:
Файл Описание РазмерФормат 
scopusresults 3120 .pdf
  Доступ ограничен
134.14 kBAdobe PDFПросмотреть/Открыть
WoS 1910 .pdf
  Доступ ограничен
124.71 kBAdobe PDFПросмотреть/Открыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.