Analytical Review of Cryptographic Primitives to Use in Fog Computing
This paper discusses the security aspects of fog computing. Most cryptographic algorithms were designed for centralized systems, but distributed systems such as cloud and fog computing present additional challenges due to the geographic separation of computing nodes. The paper presents a study of ad...
Сохранить в:
| Главные авторы: | , , , , , |
|---|---|
| Формат: | Статья |
| Язык: | English |
| Опубликовано: |
Springer Science and Business Media Deutschland GmbH
2024
|
| Темы: | |
| Online-ссылка: | https://dspace.ncfu.ru/handle/123456789/29307 |
| Метки: |
Добавить метку
Нет меток, Требуется 1-ая метка записи!
|
| id |
ir-123456789-29307 |
|---|---|
| record_format |
dspace |
| spelling |
ir-123456789-293072024-12-04T12:50:58Z Analytical Review of Cryptographic Primitives to Use in Fog Computing Shiriaev, E. M. Ширяев, Е. М. Kucherov, N. N. Кучеров, Н. Н. Bezuglova, E. S. Безуглова, Е. С. CKKS Homomorphic encryption Cyber-security Digital signature Fog computing This paper discusses the security aspects of fog computing. Most cryptographic algorithms were designed for centralized systems, but distributed systems such as cloud and fog computing present additional challenges due to the geographic separation of computing nodes. The paper presents a study of adapting existing cryptographic algorithms for use in fog computing environments. A comparative analysis of the methods considered is provided, with a focus on the CKKS homomorphic encryption scheme. This scheme allows for the processing of encrypted data with fixed precision, ensuring a high level of confidentiality. 2024-12-04T12:50:17Z 2024-12-04T12:50:17Z 2024 Статья Shiriaev, E., Kucherov, N., Bezuglova, E. Analytical Review of Cryptographic Primitives to Use in Fog Computing // Lecture Notes in Networks and Systems. - 2024. - 863 LNNS. - pp. 267-276. - DOI: 10.1007/978-3-031-72171-7_27 https://dspace.ncfu.ru/handle/123456789/29307 en Lecture Notes in Networks and Systems application/pdf Springer Science and Business Media Deutschland GmbH |
| institution |
СКФУ |
| collection |
Репозиторий |
| language |
English |
| topic |
CKKS Homomorphic encryption Cyber-security Digital signature Fog computing |
| spellingShingle |
CKKS Homomorphic encryption Cyber-security Digital signature Fog computing Shiriaev, E. M. Ширяев, Е. М. Kucherov, N. N. Кучеров, Н. Н. Bezuglova, E. S. Безуглова, Е. С. Analytical Review of Cryptographic Primitives to Use in Fog Computing |
| description |
This paper discusses the security aspects of fog computing. Most cryptographic algorithms were designed for centralized systems, but distributed systems such as cloud and fog computing present additional challenges due to the geographic separation of computing nodes. The paper presents a study of adapting existing cryptographic algorithms for use in fog computing environments. A comparative analysis of the methods considered is provided, with a focus on the CKKS homomorphic encryption scheme. This scheme allows for the processing of encrypted data with fixed precision, ensuring a high level of confidentiality. |
| format |
Статья |
| author |
Shiriaev, E. M. Ширяев, Е. М. Kucherov, N. N. Кучеров, Н. Н. Bezuglova, E. S. Безуглова, Е. С. |
| author_facet |
Shiriaev, E. M. Ширяев, Е. М. Kucherov, N. N. Кучеров, Н. Н. Bezuglova, E. S. Безуглова, Е. С. |
| author_sort |
Shiriaev, E. M. |
| title |
Analytical Review of Cryptographic Primitives to Use in Fog Computing |
| title_short |
Analytical Review of Cryptographic Primitives to Use in Fog Computing |
| title_full |
Analytical Review of Cryptographic Primitives to Use in Fog Computing |
| title_fullStr |
Analytical Review of Cryptographic Primitives to Use in Fog Computing |
| title_full_unstemmed |
Analytical Review of Cryptographic Primitives to Use in Fog Computing |
| title_sort |
analytical review of cryptographic primitives to use in fog computing |
| publisher |
Springer Science and Business Media Deutschland GmbH |
| publishDate |
2024 |
| url |
https://dspace.ncfu.ru/handle/123456789/29307 |
| work_keys_str_mv |
AT shiriaevem analyticalreviewofcryptographicprimitivestouseinfogcomputing AT širâevem analyticalreviewofcryptographicprimitivestouseinfogcomputing AT kucherovnn analyticalreviewofcryptographicprimitivestouseinfogcomputing AT kučerovnn analyticalreviewofcryptographicprimitivestouseinfogcomputing AT bezuglovaes analyticalreviewofcryptographicprimitivestouseinfogcomputing AT bezuglovaes analyticalreviewofcryptographicprimitivestouseinfogcomputing |
| _version_ |
1842245622672916480 |