Securing Fog Computing Networks: An Advanced Trust Management System Leveraging Fuzzy Techniques and Hierarchical Evaluation DOI Creative Commons
Shraddha Thakkar,

Jaykumar Dave

International Journal of Electrical and Electronics Engineering, Год журнала: 2024, Номер 11(12), С. 229 - 234

Опубликована: Дек. 31, 2024

This paper presents a Trust Management System (TMS) designed to counteract cyber-attacks in fog computing environments. The system integrates fuzzy AHP, hierarchical PROMETHEE methods, and ranking evaluate trust based on Quality of Service (QoS), Security (QoSec), economic factors. Tested against Replay, On-Off, Bad-mouthing, Ransomware attacks, the demonstrates high detection accuracy, with error rates between 3.50% 4.15%. results show that proposed TMS effectively enhances security evaluation networks.

Язык: Английский

PAM: Predictive analytics and modules‐based computation offloading framework using greedy heuristics and 5G NR‐V2X DOI
Muhammad Ilyas Khattak, Hui Yuan, Ayaz Ahmad

и другие.

Transactions on Emerging Telecommunications Technologies, Год журнала: 2024, Номер 35(7)

Опубликована: Июнь 25, 2024

Abstract Recent advancements in distributed computing systems have shown promising prospects enabling the effective usage of many next‐generation applications. These applications include a wide range fields, such as healthcare, interactive gaming, video streaming, and other related technologies. Among solutions are evolving vehicular fog (VFC) frameworks that make use IEEE 3GPP protocols advanced optimization algorithms. However, these approaches often rely on outdated or computationally intensive mathematical techniques for solving representing their models. Additionally, some not thoroughly considered type application during evaluation validation phases. In response to challenges, we developed “predictive analytics modules” (PAM) framework, which operates time event‐driven basis. It utilizes up‐to‐date address inherent unpredictability VFC‐enabled required smart healthcare systems. Through combination greedy heuristic approach offloading architecture, PAM efficiently optimizes decisions task computation allocation. This is achieved through specialized algorithms provide support weaker devices, all within frame under 100 ms. To assess performance comparison three benchmark methodologies, pathways employed average time, probability density function, pareto‐analysis, algorithmic run complexity.

Язык: Английский

Процитировано

1

An Integrated Technique for Securing Large Virtual Machine Migration DOI Creative Commons
Shiladitya Bhattacharjee, Tanupriya Choudhury, Ahmed M. Abdelmoniem

и другие.

Research Square (Research Square), Год журнала: 2024, Номер unknown

Опубликована: Янв. 31, 2024

Abstract Maintaining data confidentiality and integrity during the large VM migration is quite challenging. Simultaneously, use of complex encryption or steganography for managing them increases time overheads. These may cause loss. The transportation VMs further consumes significant bandwidth causes page faults. However, these issues aren't dealt with in modern literature, despite many research attempts. Moreover, unlawful intrusions various transmission errors make matters worse. Hence, this work proposes an efficient technique that addresses such outstanding a unified way. suggested solution has special compression method reduces big sizes to 53.9%, new enhance integrity, smart split stop faults as well lower loss 0.0009%. results show it cuts down on downtime by 10% more than existing methods. obtained justify its efficiencies over other ones distinct dimensions.

Язык: Английский

Процитировано

1

Multi Objective Hybrid Load Balancing Based Optimization Algorithm for Improving Fog Computing Performance DOI Creative Commons

V. Gowri,

B. Baranidharan

Research Square (Research Square), Год журнала: 2023, Номер unknown

Опубликована: Янв. 19, 2023

Abstract The authors have requested that this preprint be removed from Research Square.

Язык: Английский

Процитировано

3

Hybrid approach for virtual machine allocation in cloud computing DOI

B. Booba,

X. Joshphin Jasaline Anitha,

Chilukuri K. Mohan

и другие.

Sustainable Computing Informatics and Systems, Год журнала: 2023, Номер 41, С. 100922 - 100922

Опубликована: Окт. 12, 2023

Язык: Английский

Процитировано

3

A Lightweight Energy-Efficient Technique for QoS Enhancement in Urban VFC for Intelligent Transportation System DOI
Deep Chandra Binwal, Rajeev Tiwari, Monit Kapoor

и другие.

Journal of Network and Systems Management, Год журнала: 2023, Номер 31(4)

Опубликована: Июль 26, 2023

Язык: Английский

Процитировано

2

Unavailability-aware allocation of backup resources considering failures of virtual and physical machines DOI
Nozomi Kita, Eiji Oki

Computer Networks, Год журнала: 2023, Номер 239, С. 110141 - 110141

Опубликована: Дек. 15, 2023

Язык: Английский

Процитировано

2

Energy Coherent Fog Networks Using Multi-Sink Wireless Sensor Networks DOI Creative Commons
Rabie Α. Ramadan, Md. Haidar Sharif,

Eissa Jaber Alreshidi

и другие.

IEEE Access, Год журнала: 2021, Номер 9, С. 167715 - 167735

Опубликована: Янв. 1, 2021

Fog computing (FC) models the cloud paradigm expedient by bridging breach between centralized data servers and diverse terrestrially distributed applications. It wields various wireless sensor networks (WSNs) that sprawl in core of any IoT Consequently, operation fog network turns on efficiency WSNs operation, while all-inclusive energy consumption depends both FC operation. This paper addresses how dissimilar organizations a can influence its effectiveness savings. Chiefly, it appraises whether deploying multi-sink nodes close enough vicinity to give savings foster coherent communication networks. To assess assignment problem following four criteria are used: (i) Distance from nodes; (ii) Nodes degree; (iii) Sink energy; (iv) processing capabilities. suggests novel solutions connectivity for some challenges deeming: Window Nondominant Set (WNS); Evaluation Based Approach (EBA); Harris Hawks Optimizer (HHO); Modified HHO (MHHO). Distinct sets experiments conducted check out algorithmic performance. The performance all algorithms is measured then compared each other terms power consumption, runtime, packet loss, localization error. One key supremacies our approaches utilization processing, principally with large-scale Yet, could need further study due limited range sensors.

Язык: Английский

Процитировано

5

A Trusted Resource Allocation Scheme in Fog Environment to Satisfy High Network Demand DOI

Vibha Jain,

Bijendra Kumar

Arabian Journal for Science and Engineering, Год журнала: 2022, Номер 48(8), С. 9769 - 9786

Опубликована: Окт. 26, 2022

Язык: Английский

Процитировано

3

Interoperability and Portability in Big Data Analysis Based Cloud-Fog-Edge-Dew Computing DOI

AmirHossein Jafari Pozveh,

Seyedeh Maryam Mazinani,

Mahsa Faraji Shoyari

и другие.

Studies in big data, Год журнала: 2024, Номер unknown, С. 209 - 245

Опубликована: Янв. 1, 2024

Язык: Английский

Процитировано

0

A Scalable Framework for Secure and Reliable Wireless-based Fog Cloud Communication DOI Creative Commons

Kymbat Khairosheva,

Abdul Razaque,

Gulnara Bektemyssova

и другие.

Measurement Sensors, Год журнала: 2024, Номер unknown, С. 101408 - 101408

Опубликована: Дек. 1, 2024

Язык: Английский

Процитировано

0