Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems
Security is one of the most important characteristics of systems based on fog computing. If in other distributed systems it is possible to organize security based on cryptographic security systems due to their computing power, then fog computing has limitations. These limitations are related to the...
Сохранить в:
| Главные авторы: | , , , , , |
|---|---|
| Формат: | Статья |
| Язык: | English |
| Опубликовано: |
Springer Science and Business Media Deutschland GmbH
2024
|
| Темы: | |
| Online-ссылка: | https://dspace.ncfu.ru/handle/123456789/29247 |
| Метки: |
Добавить метку
Нет меток, Требуется 1-ая метка записи!
|
| Краткое описание: | Security is one of the most important characteristics of systems based on fog computing. If in other distributed systems it is possible to organize security based on cryptographic security systems due to their computing power, then fog computing has limitations. These limitations are related to the computing power of the devices, since the fog in this case is interpreted as a connected space of many low-power devices. To solve this problem, it is possible to use so-called active security methods. This paper proposes modified active security systems based on homomorphic encryption. Homomorphic encryption allows you to process data in encrypted form, which avoids data theft, and the active system itself keeps the data safe from compromised access. Thus, the proposed modification increases the resistance of fog systems to various threats. |
|---|