A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing

被引:0
|
作者
Priyanka Rajan Kumar [1 ]
Sonia Goel [1 ]
机构
[1] Department of Computer Science, Punjabi University, Patiala
关键词
Adaptive encryption; AES algorithm; ECC algorithm; Fog computing; Machine learning;
D O I
10.1038/s41598-025-92245-9
中图分类号
学科分类号
摘要
Fog computing, as a crucial component of the edge computing paradigm, offers significant advantages in terms of reduced latency and real-time processing. However, its distributed and heterogeneous nature presents distinct security challenges. This research introduces a novel adaptive encryption framework powered by machine learning to address these security concerns. The proposed system dynamically selects and adjusts encryption methods and key strengths based on data sensitivity and the communication context, ensuring a balance between security and performance. The system employs the K-Nearest Neighbors (KNN) classification algorithm to categorize data into sensitive and normal types. For sensitive data, a hybrid encryption approach combining Elliptic Curve Cryptography (ECC) and Advanced Encryption Standard (AES) is applied, ensuring secure key derivation and strong cryptographic protection. For normal data, the system uses standard AES encryption, achieving processing efficiency while maintaining adequate security levels. The effectiveness of the proposed system has been validated through a comprehensive set of experiments, including evaluations of Encryption Time, Decryption Time, Encryption Throughput, Decryption Throughput, and Histogram Analysis. Additionally, we assess security through the Number of Pixels Change Rate (NPCR = 99.349%) and Unified Average Changing Intensity (UACI = 33.079%). The scalability of the system has been thoroughly validated using datasets of varying sizes (1kB, 100kB, and 1000 kB) with variability achieved through the use of both text and image datasets. These evaluations demonstrate the system’s adaptability and performance consistency across diverse data transmission scenarios, making it suitable for large-scale fog environments. The results collectively demonstrate that the adaptive encryption methodology significantly enhances security while maintaining efficiency in data transmission and processing within fog computing environments. © The Author(s) 2025.
引用
收藏
相关论文
共 50 条
  • [21] On the classification of fog computing applications: A machine learning perspective
    Guevara, Judy C.
    Torres, Ricardo da S.
    da Fonseca, Nelson L. S.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 159 (159)
  • [22] A Secure Data Aggregation Protocol for Fog Computing Based Smart Grids
    Okay, Feyza Yildirim
    Ozdemir, Suat
    PROCEEDINGS 2018 IEEE 12TH INTERNATIONAL CONFERENCE ON COMPATIBILITY, POWER ELECTRONICS AND POWER ENGINEERING (CPE-POWERENG 2018), 2018,
  • [23] Machine learning applications for fog computing in IoT: a survey
    Mousavi, Mitra
    Rezazadeh, Javad
    Sianaki, Omid Ameri
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2021, 17 (04) : 293 - 320
  • [24] Adaptively secure multi-authority attribute-based broadcast encryption in fog computing
    Chen, Jie
    Niu, Jiaxu
    Lei, Hao
    Lin, Li
    Ling, Yunhao
    COMPUTER NETWORKS, 2023, 232
  • [25] Machine Learning for Fog Computing: Review, Opportunities and a Fog Application Classifier and Scheduler
    Mohd Aqib
    Dinesh Kumar
    Sarsij Tripathi
    Wireless Personal Communications, 2023, 129 : 853 - 880
  • [26] Machine Learning for Fog Computing: Review, Opportunities and a Fog Application Classifier and Scheduler
    Aqib, Mohd
    Kumar, Dinesh
    Tripathi, Sarsij
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (02) : 853 - 880
  • [27] Adaptive probabilistic neural network based edge data center authentication for secure load balancing in fog computing
    Gowri, V.
    Baranidharan, B.
    APPLIED SOFT COMPUTING, 2025, 169
  • [28] Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption
    Kurniawan, Agus
    Kyas, Marcel
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 30 - 34
  • [29] Machine Learning Method Based on Stream Homomorphic Encryption Computing
    Zhang, Yizhuo
    Liu, Yiwei
    Chung, Chan-Liang
    Wei, Yu-Chih
    Chen, Chi-Hua
    2020 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TAIWAN), 2020,
  • [30] Machine learning based fog computing assisted data-driven approach for early lameness detection in dairy cattle
    Taneja, Mohit
    Byabazaire, John
    Jalodia, Nikita
    Davy, Alan
    Olariu, Cristian
    Malone, Paul
    COMPUTERS AND ELECTRONICS IN AGRICULTURE, 2020, 171