Analytical Review of Cryptographic Primitives to Use in Fog Computing
This paper discusses the security aspects of fog computing. Most cryptographic algorithms were designed for centralized systems, but distributed systems such as cloud and fog computing present additional challenges due to the geographic separation of computing nodes. The paper presents a study of ad...
Сохранить в:
| Главные авторы: | , , , , , |
|---|---|
| Формат: | Статья |
| Язык: | English |
| Опубликовано: |
Springer Science and Business Media Deutschland GmbH
2024
|
| Темы: | |
| Online-ссылка: | https://dspace.ncfu.ru/handle/123456789/29307 |
| Метки: |
Добавить метку
Нет меток, Требуется 1-ая метка записи!
|
| Краткое описание: | This paper discusses the security aspects of fog computing. Most cryptographic algorithms were designed for centralized systems, but distributed systems such as cloud and fog computing present additional challenges due to the geographic separation of computing nodes. The paper presents a study of adapting existing cryptographic algorithms for use in fog computing environments. A comparative analysis of the methods considered is provided, with a focus on the CKKS homomorphic encryption scheme. This scheme allows for the processing of encrypted data with fixed precision, ensuring a high level of confidentiality. |
|---|