{"title":"A Secure Recommender System Model for Service Placement in Wireless Networks","authors":"Luan Gashi, A. Luma, Halil Snopçe, Ylber Januzaj","doi":"10.3991/ijim.v17i11.37369","DOIUrl":null,"url":null,"abstract":"Edge or fog computing are being used to reduce latency between end devices and traditional cloud computing. The latest developments that have improved the hardware aspects of wireless sensors and mobile networks, gave the opportunity for other enhancements if such technologies are integrated between them. Regarding this enhanced heterogeneous environment, the approach of placing services needs to reconsider the security aspects. We have developed a baseline method of a solution which fulfills the cybersecurity requirements converging with the proposed multi-tier integrated model, that enhances the K-means algorithm with added processing steps supplying the criteria of the CIA triad.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Interact. Mob. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3991/ijim.v17i11.37369","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Edge or fog computing are being used to reduce latency between end devices and traditional cloud computing. The latest developments that have improved the hardware aspects of wireless sensors and mobile networks, gave the opportunity for other enhancements if such technologies are integrated between them. Regarding this enhanced heterogeneous environment, the approach of placing services needs to reconsider the security aspects. We have developed a baseline method of a solution which fulfills the cybersecurity requirements converging with the proposed multi-tier integrated model, that enhances the K-means algorithm with added processing steps supplying the criteria of the CIA triad.