Пропуск в контексте

Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems

Security is one of the most important characteristics of systems based on fog computing. If in other distributed systems it is possible to organize security based on cryptographic security systems due to their computing power, then fog computing has limitations. These limitations are related to the...

Полное описание

Сохранить в:
Библиографические подробности
Главные авторы: Shiriaev, E. M., Ширяев, Е. М., Kucherov, N. N., Кучеров, Н. Н., Movzalevskaya, V., Мовзалевская, В.
Формат: Статья
Язык:English
Опубликовано: Springer Science and Business Media Deutschland GmbH 2024
Темы:
Online-ссылка:https://dspace.ncfu.ru/handle/123456789/29247
Метки: Добавить метку
Нет меток, Требуется 1-ая метка записи!
id ir-123456789-29247
record_format dspace
spelling ir-123456789-292472024-11-27T11:33:05Z Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems Shiriaev, E. M. Ширяев, Е. М. Kucherov, N. N. Кучеров, Н. Н. Movzalevskaya, V. Мовзалевская, В. Active security Homomorphic encryption Cryptography Fog computing Security is one of the most important characteristics of systems based on fog computing. If in other distributed systems it is possible to organize security based on cryptographic security systems due to their computing power, then fog computing has limitations. These limitations are related to the computing power of the devices, since the fog in this case is interpreted as a connected space of many low-power devices. To solve this problem, it is possible to use so-called active security methods. This paper proposes modified active security systems based on homomorphic encryption. Homomorphic encryption allows you to process data in encrypted form, which avoids data theft, and the active system itself keeps the data safe from compromised access. Thus, the proposed modification increases the resistance of fog systems to various threats. 2024-11-27T11:32:00Z 2024-11-27T11:32:00Z 2024 Статья Shiriaev E., Kucherov N., Movzalevskaya V., Khamidov M. Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems // Lecture Notes in Networks and Systems. - 2024. - 863 LNNS. - pp. 277 - 285. - DOI: 10.1007/978-3-031-72171-7_28 https://dspace.ncfu.ru/handle/123456789/29247 en Lecture Notes in Networks and Systems application/pdf Springer Science and Business Media Deutschland GmbH
institution СКФУ
collection Репозиторий
language English
topic Active security
Homomorphic encryption
Cryptography
Fog computing
spellingShingle Active security
Homomorphic encryption
Cryptography
Fog computing
Shiriaev, E. M.
Ширяев, Е. М.
Kucherov, N. N.
Кучеров, Н. Н.
Movzalevskaya, V.
Мовзалевская, В.
Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems
description Security is one of the most important characteristics of systems based on fog computing. If in other distributed systems it is possible to organize security based on cryptographic security systems due to their computing power, then fog computing has limitations. These limitations are related to the computing power of the devices, since the fog in this case is interpreted as a connected space of many low-power devices. To solve this problem, it is possible to use so-called active security methods. This paper proposes modified active security systems based on homomorphic encryption. Homomorphic encryption allows you to process data in encrypted form, which avoids data theft, and the active system itself keeps the data safe from compromised access. Thus, the proposed modification increases the resistance of fog systems to various threats.
format Статья
author Shiriaev, E. M.
Ширяев, Е. М.
Kucherov, N. N.
Кучеров, Н. Н.
Movzalevskaya, V.
Мовзалевская, В.
author_facet Shiriaev, E. M.
Ширяев, Е. М.
Kucherov, N. N.
Кучеров, Н. Н.
Movzalevskaya, V.
Мовзалевская, В.
author_sort Shiriaev, E. M.
title Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems
title_short Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems
title_full Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems
title_fullStr Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems
title_full_unstemmed Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems
title_sort modification and adaptation of methods and algorithms of the active security concept for fog systems
publisher Springer Science and Business Media Deutschland GmbH
publishDate 2024
url https://dspace.ncfu.ru/handle/123456789/29247
work_keys_str_mv AT shiriaevem modificationandadaptationofmethodsandalgorithmsoftheactivesecurityconceptforfogsystems
AT širâevem modificationandadaptationofmethodsandalgorithmsoftheactivesecurityconceptforfogsystems
AT kucherovnn modificationandadaptationofmethodsandalgorithmsoftheactivesecurityconceptforfogsystems
AT kučerovnn modificationandadaptationofmethodsandalgorithmsoftheactivesecurityconceptforfogsystems
AT movzalevskayav modificationandadaptationofmethodsandalgorithmsoftheactivesecurityconceptforfogsystems
AT movzalevskaâv modificationandadaptationofmethodsandalgorithmsoftheactivesecurityconceptforfogsystems
_version_ 1842245896477081600