Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/123456789/29307
Title: Analytical Review of Cryptographic Primitives to Use in Fog Computing
Authors: Shiriaev, E. M.
Ширяев, Е. М.
Kucherov, N. N.
Кучеров, Н. Н.
Bezuglova, E. S.
Безуглова, Е. С.
Keywords: CKKS;Homomorphic encryption;Cyber-security;Digital signature;Fog computing
Issue Date: 2024
Publisher: Springer Science and Business Media Deutschland GmbH
Citation: Shiriaev, E., Kucherov, N., Bezuglova, E. Analytical Review of Cryptographic Primitives to Use in Fog Computing // Lecture Notes in Networks and Systems. - 2024. - 863 LNNS. - pp. 267-276. - DOI: 10.1007/978-3-031-72171-7_27
Series/Report no.: Lecture Notes in Networks and Systems
Abstract: This paper discusses the security aspects of fog computing. Most cryptographic algorithms were designed for centralized systems, but distributed systems such as cloud and fog computing present additional challenges due to the geographic separation of computing nodes. The paper presents a study of adapting existing cryptographic algorithms for use in fog computing environments. A comparative analysis of the methods considered is provided, with a focus on the CKKS homomorphic encryption scheme. This scheme allows for the processing of encrypted data with fixed precision, ensuring a high level of confidentiality.
URI: https://dspace.ncfu.ru/handle/123456789/29307
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 3310.pdf
  Restricted Access
132.48 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.