scholarly journals A Fog Computing Security: 2-Adic Complexity of Balanced Sequences

2018 ◽  
Vol 2018 ◽  
pp. 1-9
Author(s):  
Wang Hui-Juan ◽  
Jiang Yong

In the fog computing environment, the periodic sequence can provide sufficient authentication code and also reduce the power consumption in the verification. But the periodic sequence faces a known full-cycle attack threat in fog computing. This paper studies the 2-adic complexity attack ability of the periodic balance sequence in the fog computing environment. It uses the exponential function as a new approach to study the 2-adic properties of periodic balance sequence and presents that the 2-adic complexity of the periodic balanced sequence is not an attacking threat when used in fog computing.

2019 ◽  
Vol 9 (9) ◽  
pp. 1730 ◽  
Author(s):  
Binh Minh Nguyen ◽  
Huynh Thi Thanh Binh ◽  
Tran The Anh ◽  
Do Bao Son

In recent years, constant developments in Internet of Things (IoT) generate large amounts of data, which put pressure on Cloud computing’s infrastructure. The proposed Fog computing architecture is considered the next generation of Cloud Computing for meeting the requirements posed by the device network of IoT. One of the obstacles of Fog Computing is distribution of computing resources to minimize completion time and operating cost. The following study introduces a new approach to optimize task scheduling problem for Bag-of-Tasks applications in Cloud–Fog environment in terms of execution time and operating costs. The proposed algorithm named TCaS was tested on 11 datasets varying in size. The experimental results show an improvement of 15.11% compared to the Bee Life Algorithm (BLA) and 11.04% compared to Modified Particle Swarm Optimization (MPSO), while achieving balance between completing time and operating cost.


Fog computing is considered emerging technology nowadays. Due to proximity to the end user, fog computing provides a reliable transmission with low latency. In this paper, we have proposed an improved mutual authentication security scheme based on advanced encryption standard AES and hashed message authentication code HMAC in fog computing. Our scheme provides mutual authentication between edge devices and fog server in edge fog cloud computing environment. Further, the scheme has the resistance to man in the middle attack in the fog computing environment. Detailed security analyses are summarized.


2021 ◽  
Vol 3 (1) ◽  
pp. 65-82
Author(s):  
Sören Henning ◽  
Wilhelm Hasselbring ◽  
Heinz Burmester ◽  
Armin Möbius ◽  
Maik Wojcieszak

AbstractThe Internet of Things adoption in the manufacturing industry allows enterprises to monitor their electrical power consumption in real time and at machine level. In this paper, we follow up on such emerging opportunities for data acquisition and show that analyzing power consumption in manufacturing enterprises can serve a variety of purposes. In two industrial pilot cases, we discuss how analyzing power consumption data can serve the goals reporting, optimization, fault detection, and predictive maintenance. Accompanied by a literature review, we propose to implement the measures real-time data processing, multi-level monitoring, temporal aggregation, correlation, anomaly detection, forecasting, visualization, and alerting in software to tackle these goals. In a pilot implementation of a power consumption analytics platform, we show how our proposed measures can be implemented with a microservice-based architecture, stream processing techniques, and the fog computing paradigm. We provide the implementations as open source as well as a public show case allowing to reproduce and extend our research.


2019 ◽  
Vol 5 (4) ◽  
pp. 209-233 ◽  
Author(s):  
Jimoh Yakubu ◽  
Shafi’i Muhammad Abdulhamid ◽  
Haruna Atabo Christopher ◽  
Haruna Chiroma ◽  
Mohammed Abdullahi

Sign in / Sign up

Export Citation Format

Share Document