Пропуск в контексте

Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems

Security is one of the most important characteristics of systems based on fog computing. If in other distributed systems it is possible to organize security based on cryptographic security systems due to their computing power, then fog computing has limitations. These limitations are related to the...

Полное описание

Сохранить в:
Библиографические подробности
Главные авторы: Shiriaev, E. M., Ширяев, Е. М., Kucherov, N. N., Кучеров, Н. Н., Movzalevskaya, V., Мовзалевская, В.
Формат: Статья
Язык:English
Опубликовано: Springer Science and Business Media Deutschland GmbH 2024
Темы:
Online-ссылка:https://dspace.ncfu.ru/handle/123456789/29247
Метки: Добавить метку
Нет меток, Требуется 1-ая метка записи!
Описание
Краткое описание:Security is one of the most important characteristics of systems based on fog computing. If in other distributed systems it is possible to organize security based on cryptographic security systems due to their computing power, then fog computing has limitations. These limitations are related to the computing power of the devices, since the fog in this case is interpreted as a connected space of many low-power devices. To solve this problem, it is possible to use so-called active security methods. This paper proposes modified active security systems based on homomorphic encryption. Homomorphic encryption allows you to process data in encrypted form, which avoids data theft, and the active system itself keeps the data safe from compromised access. Thus, the proposed modification increases the resistance of fog systems to various threats.