A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing

被引:0
|
作者
Priyanka Rajan Kumar [1 ]
Sonia Goel [1 ]
机构
[1] Punjabi University,Department of Computer Science
关键词
Fog computing; ECC algorithm; AES algorithm; Adaptive encryption; Machine learning;
D O I
10.1038/s41598-025-92245-9
中图分类号
学科分类号
摘要
Fog computing, as a crucial component of the edge computing paradigm, offers significant advantages in terms of reduced latency and real-time processing. However, its distributed and heterogeneous nature presents distinct security challenges. This research introduces a novel adaptive encryption framework powered by machine learning to address these security concerns. The proposed system dynamically selects and adjusts encryption methods and key strengths based on data sensitivity and the communication context, ensuring a balance between security and performance. The system employs the K-Nearest Neighbors (KNN) classification algorithm to categorize data into sensitive and normal types. For sensitive data, a hybrid encryption approach combining Elliptic Curve Cryptography (ECC) and Advanced Encryption Standard (AES) is applied, ensuring secure key derivation and strong cryptographic protection. For normal data, the system uses standard AES encryption, achieving processing efficiency while maintaining adequate security levels. The effectiveness of the proposed system has been validated through a comprehensive set of experiments, including evaluations of Encryption Time, Decryption Time, Encryption Throughput, Decryption Throughput, and Histogram Analysis. Additionally, we assess security through the Number of Pixels Change Rate (NPCR = 99.349%) and Unified Average Changing Intensity (UACI = 33.079%). The scalability of the system has been thoroughly validated using datasets of varying sizes (1kB, 100kB, and 1000 kB) with variability achieved through the use of both text and image datasets. These evaluations demonstrate the system’s adaptability and performance consistency across diverse data transmission scenarios, making it suitable for large-scale fog environments. The results collectively demonstrate that the adaptive encryption methodology significantly enhances security while maintaining efficiency in data transmission and processing within fog computing environments.
引用
收藏
相关论文
共 50 条
  • [1] Securing IoT-Empowered Fog Computing Systems: Machine Learning Perspective
    Ahanger, Tariq Ahamed
    Tariq, Usman
    Ibrahim, Atef
    Ullah, Imdad
    Bouteraa, Yassine
    Gebali, Fayez
    MATHEMATICS, 2022, 10 (08)
  • [2] Secure and efficient big data deduplication in fog computing
    Yan, Jiajun
    Wang, Xiaoming
    Gan, Qingqing
    Li, Suyu
    Huang, Daxin
    SOFT COMPUTING, 2020, 24 (08) : 5671 - 5682
  • [3] Secure and efficient big data deduplication in fog computing
    Jiajun Yan
    Xiaoming Wang
    Qingqing Gan
    Suyu Li
    Daxin Huang
    Soft Computing, 2020, 24 : 5671 - 5682
  • [4] Fog Computing Approach for Music Cognition System Based on Machine Learning Algorithm
    Lu, Lifei
    Xu, Lida
    Xu, Boyi
    Li, Guoqiang
    Cai, Hongming
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2018, 5 (04): : 1142 - 1151
  • [5] Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing
    Koo, Dongyoung
    Shin, Youngjoo
    Yun, Joobeom
    Hur, Junbeom
    2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 285 - 293
  • [6] CPS data streams analytics based on machine learning for Cloud and Fog Computing: A survey
    Fei, Xiang
    Shah, Nazaraf
    Verba, Nandor
    Chao, Kuo-Ming
    Sanchez-Anguix, Victor
    Lewandowski, Jacek
    James, Anne
    Usman, Zahid
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 90 : 435 - 450
  • [7] Adaptive secure malware efficient machine learning algorithm for healthcare data
    Mohammed, Mazin Abed
    Lakhan, Abdullah
    Zebari, Dilovan Asaad
    Abdulkareem, Karrar Hameed
    Nedoma, Jan
    Martinek, Radek
    Tariq, Usman
    Alhaisoni, Majed
    Tiwari, Prayag
    CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2023,
  • [8] SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing
    Saidi, Ahmed
    Nouali, Omar
    Amira, Abdelouahab
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 167 - 185
  • [9] SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing
    Ahmed Saidi
    Omar Nouali
    Abdelouahab Amira
    Cluster Computing, 2022, 25 : 167 - 185
  • [10] An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid
    Merad-Boudia, Omar Rafik
    Senouci, Sidi Mohammed
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08) : 6143 - 6153