Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/123456789/29247
Title: Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems
Authors: Shiriaev, E. M.
Ширяев, Е. М.
Kucherov, N. N.
Кучеров, Н. Н.
Movzalevskaya, V. V.
Мовзалевская, В. В.
Keywords: Active security;Homomorphic encryption;Cryptography;Fog computing
Issue Date: 2024
Publisher: Springer Science and Business Media Deutschland GmbH
Citation: Shiriaev E., Kucherov N., Movzalevskaya V., Khamidov M. Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems // Lecture Notes in Networks and Systems. - 2024. - 863 LNNS. - pp. 277 - 285. - DOI: 10.1007/978-3-031-72171-7_28
Series/Report no.: Lecture Notes in Networks and Systems
Abstract: Security is one of the most important characteristics of systems based on fog computing. If in other distributed systems it is possible to organize security based on cryptographic security systems due to their computing power, then fog computing has limitations. These limitations are related to the computing power of the devices, since the fog in this case is interpreted as a connected space of many low-power devices. To solve this problem, it is possible to use so-called active security methods. This paper proposes modified active security systems based on homomorphic encryption. Homomorphic encryption allows you to process data in encrypted form, which avoids data theft, and the active system itself keeps the data safe from compromised access. Thus, the proposed modification increases the resistance of fog systems to various threats.
URI: https://dspace.ncfu.ru/handle/123456789/29247
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 3268.pdf
  Restricted Access
127.95 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.