Пропуск в контексте

Analytical Review of Cryptographic Primitives to Use in Fog Computing

This paper discusses the security aspects of fog computing. Most cryptographic algorithms were designed for centralized systems, but distributed systems such as cloud and fog computing present additional challenges due to the geographic separation of computing nodes. The paper presents a study of ad...

Полное описание

Сохранить в:
Библиографические подробности
Главные авторы: Shiriaev, E. M., Ширяев, Е. М., Kucherov, N. N., Кучеров, Н. Н., Bezuglova, E. S., Безуглова, Е. С.
Формат: Статья
Язык:English
Опубликовано: Springer Science and Business Media Deutschland GmbH 2024
Темы:
Online-ссылка:https://dspace.ncfu.ru/handle/123456789/29307
Метки: Добавить метку
Нет меток, Требуется 1-ая метка записи!
id ir-123456789-29307
record_format dspace
spelling ir-123456789-293072024-12-04T12:50:58Z Analytical Review of Cryptographic Primitives to Use in Fog Computing Shiriaev, E. M. Ширяев, Е. М. Kucherov, N. N. Кучеров, Н. Н. Bezuglova, E. S. Безуглова, Е. С. CKKS Homomorphic encryption Cyber-security Digital signature Fog computing This paper discusses the security aspects of fog computing. Most cryptographic algorithms were designed for centralized systems, but distributed systems such as cloud and fog computing present additional challenges due to the geographic separation of computing nodes. The paper presents a study of adapting existing cryptographic algorithms for use in fog computing environments. A comparative analysis of the methods considered is provided, with a focus on the CKKS homomorphic encryption scheme. This scheme allows for the processing of encrypted data with fixed precision, ensuring a high level of confidentiality. 2024-12-04T12:50:17Z 2024-12-04T12:50:17Z 2024 Статья Shiriaev, E., Kucherov, N., Bezuglova, E. Analytical Review of Cryptographic Primitives to Use in Fog Computing // Lecture Notes in Networks and Systems. - 2024. - 863 LNNS. - pp. 267-276. - DOI: 10.1007/978-3-031-72171-7_27 https://dspace.ncfu.ru/handle/123456789/29307 en Lecture Notes in Networks and Systems application/pdf Springer Science and Business Media Deutschland GmbH
institution СКФУ
collection Репозиторий
language English
topic CKKS
Homomorphic encryption
Cyber-security
Digital signature
Fog computing
spellingShingle CKKS
Homomorphic encryption
Cyber-security
Digital signature
Fog computing
Shiriaev, E. M.
Ширяев, Е. М.
Kucherov, N. N.
Кучеров, Н. Н.
Bezuglova, E. S.
Безуглова, Е. С.
Analytical Review of Cryptographic Primitives to Use in Fog Computing
description This paper discusses the security aspects of fog computing. Most cryptographic algorithms were designed for centralized systems, but distributed systems such as cloud and fog computing present additional challenges due to the geographic separation of computing nodes. The paper presents a study of adapting existing cryptographic algorithms for use in fog computing environments. A comparative analysis of the methods considered is provided, with a focus on the CKKS homomorphic encryption scheme. This scheme allows for the processing of encrypted data with fixed precision, ensuring a high level of confidentiality.
format Статья
author Shiriaev, E. M.
Ширяев, Е. М.
Kucherov, N. N.
Кучеров, Н. Н.
Bezuglova, E. S.
Безуглова, Е. С.
author_facet Shiriaev, E. M.
Ширяев, Е. М.
Kucherov, N. N.
Кучеров, Н. Н.
Bezuglova, E. S.
Безуглова, Е. С.
author_sort Shiriaev, E. M.
title Analytical Review of Cryptographic Primitives to Use in Fog Computing
title_short Analytical Review of Cryptographic Primitives to Use in Fog Computing
title_full Analytical Review of Cryptographic Primitives to Use in Fog Computing
title_fullStr Analytical Review of Cryptographic Primitives to Use in Fog Computing
title_full_unstemmed Analytical Review of Cryptographic Primitives to Use in Fog Computing
title_sort analytical review of cryptographic primitives to use in fog computing
publisher Springer Science and Business Media Deutschland GmbH
publishDate 2024
url https://dspace.ncfu.ru/handle/123456789/29307
work_keys_str_mv AT shiriaevem analyticalreviewofcryptographicprimitivestouseinfogcomputing
AT širâevem analyticalreviewofcryptographicprimitivestouseinfogcomputing
AT kucherovnn analyticalreviewofcryptographicprimitivestouseinfogcomputing
AT kučerovnn analyticalreviewofcryptographicprimitivestouseinfogcomputing
AT bezuglovaes analyticalreviewofcryptographicprimitivestouseinfogcomputing
AT bezuglovaes analyticalreviewofcryptographicprimitivestouseinfogcomputing
_version_ 1842245622672916480