Fog Computing: Comprehensive Approach for Security Data Theft Attack Using Elliptic Curve Cryptography and Decoy TechnologyReportar como inadecuado




Fog Computing: Comprehensive Approach for Security Data Theft Attack Using Elliptic Curve Cryptography and Decoy Technology - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

Fog computing extends cloud computing, provides the services like data, compute, storage and application to end user. It improves the quality of service and also reduces latency. According to Cisco, due to its wide geographical distribution, the Fog computing is well suited for real time analytics and big data. This article, by exploitation advantages of Fog computing Paradigm, analyzes its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks, Wireless Sensor and Actuator Networks, Decentralized Smart Building Control, IoT and Cyber-physical systems and software defined networks, and reviews Comprehensive Approach for security Data Theft Attack the use of Elliptic Curve Cryptography ECC and decoy technology in such a constrained environment along with the other two aspects of ECC, namely its security and efficiency. In the article, the performance of ECC is compared with the other PKC applications which should prove that ECC performs well and is more suitable for Fog environments.

KEYWORDS

Fog Computing, Elliptic Curve Cryptography ECC, Network Security, Public-Key Cryptosystem PKC, Rivest-Shamir-Adleman RSA

Cite this paper

Dong, M. and Zhou, X. 2016 Fog Computing: Comprehensive Approach for Security Data Theft Attack Using Elliptic Curve Cryptography and Decoy Technology. Open Access Library Journal, 3, 1-14. doi: 10.4236-oalib.1102802.





Autor: Mai Trung Dong, Xianwei Zhou

Fuente: http://www.scirp.org/



DESCARGAR PDF




Documentos relacionados