A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing

被引:0
作者
Priyanka Rajan Kumar [1 ]
Sonia Goel [1 ]
机构
[1] Department of Computer Science, Punjabi University, Patiala
关键词
Adaptive encryption; AES algorithm; ECC algorithm; Fog computing; Machine learning;
D O I
10.1038/s41598-025-92245-9
中图分类号
学科分类号
摘要
Fog computing, as a crucial component of the edge computing paradigm, offers significant advantages in terms of reduced latency and real-time processing. However, its distributed and heterogeneous nature presents distinct security challenges. This research introduces a novel adaptive encryption framework powered by machine learning to address these security concerns. The proposed system dynamically selects and adjusts encryption methods and key strengths based on data sensitivity and the communication context, ensuring a balance between security and performance. The system employs the K-Nearest Neighbors (KNN) classification algorithm to categorize data into sensitive and normal types. For sensitive data, a hybrid encryption approach combining Elliptic Curve Cryptography (ECC) and Advanced Encryption Standard (AES) is applied, ensuring secure key derivation and strong cryptographic protection. For normal data, the system uses standard AES encryption, achieving processing efficiency while maintaining adequate security levels. The effectiveness of the proposed system has been validated through a comprehensive set of experiments, including evaluations of Encryption Time, Decryption Time, Encryption Throughput, Decryption Throughput, and Histogram Analysis. Additionally, we assess security through the Number of Pixels Change Rate (NPCR = 99.349%) and Unified Average Changing Intensity (UACI = 33.079%). The scalability of the system has been thoroughly validated using datasets of varying sizes (1kB, 100kB, and 1000 kB) with variability achieved through the use of both text and image datasets. These evaluations demonstrate the system’s adaptability and performance consistency across diverse data transmission scenarios, making it suitable for large-scale fog environments. The results collectively demonstrate that the adaptive encryption methodology significantly enhances security while maintaining efficiency in data transmission and processing within fog computing environments. © The Author(s) 2025.
引用
收藏
相关论文
共 50 条
  • [41] Data resilience system for fog computing
    Ribeiro Junior, Franklin Magalhaes
    Kamienski, Carlos Alberto
    COMPUTER NETWORKS, 2021, 195
  • [42] Fuzzy-assisted machine learning framework for the fog-computing system in remote healthcare monitoring
    Kamruzzaman, M. M.
    Alanazi, Saad
    Alruwaili, Madallah
    Alrashdi, Ibrahim
    Alhwaiti, Yousef
    Alshammari, Nasser
    MEASUREMENT, 2022, 195
  • [43] Deep Learning for Smart Industry: Efficient Manufacture Inspection System With Fog Computing
    Li, Liangzhi
    Ota, Kaoru
    Dong, Mianxiong
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) : 4665 - 4673
  • [44] Adaptive Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
    Tang, Tingting
    Ali, Ramy E.
    Hashemi, Hanieh
    Gangwani, Tynan
    Avestimehr, Salman
    Annavaram, Murali
    2022 IEEE 36TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2022), 2022, : 628 - 638
  • [45] FC-SEEDA: fog computing-based secure and energy efficient data aggregation scheme for Internet of healthcare Things
    Chakraborty, Chinmay
    Othman, Soufiene Ben
    Almalki, Faris A. A.
    Sakli, Hedi
    NEURAL COMPUTING & APPLICATIONS, 2024, 36 (01) : 241 - 257
  • [46] An Efficient and Secure Data Transmission Mechanism for Internet of Vehicles Considering Privacy Protection in Fog Computing Environment
    Zhang, Wenjuan
    Li, Gang
    IEEE ACCESS, 2020, 8 (08): : 64461 - 64474
  • [47] An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-Time Substation Communications
    Zhang, Hua
    Qin, Boqin
    Tu, Tengfei
    Guo, Ziqing
    Gao, Fei
    Wen, Qiaoyan
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (01) : 658 - 668
  • [48] Health monitoring jeopardy prophylaxis model based on machine learning in fog computing
    Suggala, Ravi Kumar
    Krishna, M. Vamsi
    Swain, Sangram Keshari
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (07)
  • [49] FC-SEEDA: fog computing-based secure and energy efficient data aggregation scheme for Internet of healthcare Things
    Chinmay Chakraborty
    Soufiene Ben Othman
    Faris A. Almalki
    Hedi Sakli
    Neural Computing and Applications, 2024, 36 : 241 - 257
  • [50] Blockchain data privacy text intelligent encryption method based on machine learning and symbolic computing in the context of metaverse
    Lin Xu
    Discover Computing, 28 (1)