Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: https://dspace.ncfu.ru/handle/123456789/28695
Полная запись метаданных
Поле DCЗначениеЯзык
dc.contributor.authorShiriaev, E. M.-
dc.contributor.authorШиряев, Е. М.-
dc.contributor.authorBezuglova, E. S.-
dc.contributor.authorБезуглова, Е. С.-
dc.contributor.authorLapina, M. A.-
dc.contributor.authorЛапина, М. А.-
dc.contributor.authorBabenko, M. G.-
dc.contributor.authorБабенко, М. Г.-
dc.date.accessioned2024-08-01T08:38:48Z-
dc.date.available2024-08-01T08:38:48Z-
dc.date.issued2024-
dc.identifier.citationShiriaev, E., Ermakova, T., Bezuglova, E., Lapina, M.A., Babenko, M. Reliablity and Security for Fog Computing Systems // Information (Switzerland). - 2024. - 15 (6). - статья № 317. - DOI: 10.3390/info15060317ru
dc.identifier.urihttps://dspace.ncfu.ru/handle/123456789/28695-
dc.description.abstractFog computing (FC) is a distributed architecture in which computing resources and services are placed on edge devices closer to data sources. This enables more efficient data processing, shorter latency times, and better performance. Fog computing was shown to be a promising solution for addressing the new computing requirements. However, there are still many challenges to overcome to utilize this new computing paradigm, in particular, reliability and security. Following this need, a systematic literature review was conducted to create a list of requirements. As a result, the following four key requirements were formulated: (1) low latency and response times; (2) scalability and resource management; (3) fault tolerance and redundancy; and (4) privacy and security. Low delay and response can be achieved through edge caching, edge real-time analyses and decision making, and mobile edge computing. Scalability and resource management can be enabled by edge federation, virtualization and containerization, and edge resource discovery and orchestration. Fault tolerance and redundancy can be enabled by backup and recovery mechanisms, data replication strategies, and disaster recovery plans, with a residual number system (RNS) being a promising solution. Data security and data privacy are manifested in strong authentication and authorization mechanisms, access control and authorization management, with fully homomorphic encryption (FHE) and the secret sharing system (SSS) being of particular interest.ru
dc.language.isoenru
dc.publisherMultidisciplinary Digital Publishing Institute (MDPI)ru
dc.relation.ispartofseriesInformation (Switzerland)-
dc.subjectData securityru
dc.subjectFog computingru
dc.subjectDistributed computing systemsru
dc.subjectFault toleranceru
dc.subjectReliabilityru
dc.titleReliablity and Security for Fog Computing Systemsru
dc.typeСтатьяru
vkr.instИнститут цифрового развитияru
vkr.instФакультет математики и компьютерных наук имени профессора Н.И. Червяковаru
vkr.instМедико-биологический факультетru
Располагается в коллекциях:Статьи, проиндексированные в SCOPUS, WOS

Файлы этого ресурса:
Файл Описание РазмерФормат 
scopusresults 3120 .pdf
  Доступ ограничен
134.14 kBAdobe PDFПросмотреть/Открыть
WoS 1910 .pdf
  Доступ ограничен
124.71 kBAdobe PDFПросмотреть/Открыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.