A holistic mathematical cyber security model in fog resource management in computing environments

Dasharathraj Shetty, Syam Machinathu Parambil Gangadharan, K. Arumugam, Shaziya Islam, K. V. Daya Sagar, Juan Carlos Cotrina-Aliaga, Surendra Kumar
{"title":"A holistic mathematical cyber security model in fog resource management in computing environments","authors":"Dasharathraj Shetty, Syam Machinathu Parambil Gangadharan, K. Arumugam, Shaziya Islam, K. V. Daya Sagar, Juan Carlos Cotrina-Aliaga, Surendra Kumar","doi":"10.47974/jdmsc-1770","DOIUrl":null,"url":null,"abstract":"Now a days Cloud computing isn’t common sense for some Internet of things applications, fog enrolling is every now and again used. Its proper methodology keeps an eye on the necessities of IoT and present-day IoT, as well as the enormous proportion of splendid data sensors and IoT gadgets, produce, which would be extreme and drawn-out to send off the cloud for dealing with and examination. Fog enrolling diminishes the information move limit required and reduces the unstable correspondence among sensors and the cloud, which can antagonistically impact IoT execution. Fog is exceptionally conveyed and comprises a wide number of independent end gadgets, which add to the handling. In any case, the range of gadgets presented across various clients is not examined. Consequently, the security of fog computing is a main pressing issue that ought to come into thought. Thusly, to give the vital security to fog computing, there is a need to comprehend what the security concerns are with respect to fog. Fog computing is a decentralized enlisting establishment where data, handling, storing, and applications are seen as some place near the data source and the cloud. Like edge enrolling, murkiness figuring brings the advantages and power of the cloud closer to where data is made and circled back to. With fog computing, close-by data amassing and examination of time-delicate data become more direct. With this the aggregate and the distance of data passed to the cloud are diminished, thus lessening the impact of well-being and security issues.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Discrete Mathematical Sciences and Cryptography","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47974/jdmsc-1770","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Now a days Cloud computing isn’t common sense for some Internet of things applications, fog enrolling is every now and again used. Its proper methodology keeps an eye on the necessities of IoT and present-day IoT, as well as the enormous proportion of splendid data sensors and IoT gadgets, produce, which would be extreme and drawn-out to send off the cloud for dealing with and examination. Fog enrolling diminishes the information move limit required and reduces the unstable correspondence among sensors and the cloud, which can antagonistically impact IoT execution. Fog is exceptionally conveyed and comprises a wide number of independent end gadgets, which add to the handling. In any case, the range of gadgets presented across various clients is not examined. Consequently, the security of fog computing is a main pressing issue that ought to come into thought. Thusly, to give the vital security to fog computing, there is a need to comprehend what the security concerns are with respect to fog. Fog computing is a decentralized enlisting establishment where data, handling, storing, and applications are seen as some place near the data source and the cloud. Like edge enrolling, murkiness figuring brings the advantages and power of the cloud closer to where data is made and circled back to. With fog computing, close-by data amassing and examination of time-delicate data become more direct. With this the aggregate and the distance of data passed to the cloud are diminished, thus lessening the impact of well-being and security issues.
计算环境下雾资源管理中的整体网络安全数学模型
如今,对于一些物联网应用来说,云计算还不是常识,而雾登记却时不时被使用。其正确的方法关注物联网和当今物联网的必要性,以及大量出色的数据传感器和物联网设备,产生的巨大比例,这将是极端和漫长的,以发送到云端进行处理和检查。雾登记减少了所需的信息移动限制,并减少了传感器和云之间的不稳定通信,这可能会对物联网的执行产生不利影响。雾是特别传达,并包括广泛的独立终端设备,这增加了处理。在任何情况下,都不会检查跨不同客户机呈现的小工具的范围。因此,雾计算的安全性是一个迫切需要考虑的问题。因此,为了给雾计算提供至关重要的安全性,有必要了解与雾有关的安全性问题。雾计算是一种分散的招募机构,其中数据、处理、存储和应用程序被视为数据源和云附近的某个地方。与边缘注册一样,模糊计算使云的优势和力量更接近数据生成和循环返回的地方。有了雾计算,近距离的数据收集和对时间敏感数据的检查变得更加直接。这样一来,传递到云的数据总量和距离就减少了,从而减少了福祉和安全问题的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信