A neutrosophic AHP-based computational technique for security management in a fog computing network

被引:5
作者
Kaur, Jasleen [1 ]
Kumar, Rajeev [2 ]
Agrawal, Alka [1 ]
Khan, Raees Ahmad [1 ]
机构
[1] Babasaheb Bhimrao Ambedkar Univ, Dept Informat Technol, Lucknow, Uttar Pradesh, India
[2] Adm Staff Coll India, Ctr Innovat & Technol, Hyderabad, India
关键词
Fog computing; Security; Neutrosophic set; Single-valued neutrosophic set; Analytical hierarchy process; GROUP DECISION-MAKING; PRESERVING ACCESS-CONTROL; TOPSIS METHOD; SINGLE; PRIVACY; FRAMEWORK; SOFTWARE; SETS;
D O I
10.1007/s11227-022-04674-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet-enabled devices are deployed by individuals for almost every task. The concept of cloud computing has proven to be beneficial for users as the processing, storage and analysis of data are performed at the cloud level. However, in the case of latency-sensitive applications, the notion is called-off as the overall response time is high. In this situation, fog computing outperforms the cloud. With fog computing, the necessary computations are performed at the edge of the network, and thus, latency is highly reduced. In parallel, the increase in smart devices around the globe has led to a considerable increase in sensitive user data across the Web, which needs to be secured. Furthermore, multidimensional security depends on various factors whose prioritization plays an important role in addressing security issues. In this context, the authors identify various fog computing security factors and their corresponding subfactors. The identified factors are evaluated for their impact on security at the fog level through the neutrosophic-analytical hierarchy process. Moreover, to corroborate the effectiveness of the proposed technique, the results obtained are compared to the results from conventional approaches such as Fuzzy-AHP and Classical-AHP and are found to be statistically correlated. The proposed mechanism can be used by security practitioners to systematically manage fog computing security factors.
引用
收藏
页码:295 / 320
页数:26
相关论文
共 58 条
  • [1] A neutrosophic theory based security approach for fog and mobile-edge computing
    Abdel-Basset, Mohamed
    Manogaran, Gunasekaran
    Mohamed, Mai
    [J]. COMPUTER NETWORKS, 2019, 157 : 122 - 132
  • [2] RETRACTED: Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem (Retracted article. See vol. 128, pg. 569, 2022)
    Abdel-Basset, Mohamed
    Manogaran, Gunasekaran
    Mohamed, Mai
    Chilamkurti, Naveen
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 19 - 30
  • [3] An Extension of Neutrosophic AHP-SWOT Analysis for Strategic Planning and Decision-Making
    Abdel-Basset, Mohamed
    Mohamed, Mai
    Smarandache, Florentin
    [J]. SYMMETRY-BASEL, 2018, 10 (04):
  • [4] Multi-criteria group decision making based on neutrosophic analytic hierarchy process
    Abdel-Basset, Mohamed
    Mohamed, Mai
    Zhou, Yongquan
    Hezam, Ibrahim
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2017, 33 (06) : 4055 - 4066
  • [5] Fuzzy multi criteria decision making and its applications: A brief review of category
    Abdullah, Lazim
    [J]. 9TH INTERNATIONAL CONFERENCE ON COGNITIVE SCIENCE, 2013, 97 : 131 - 136
  • [6] Agrawal, 2020, 2020 11 INT C COMPUT, P1
  • [7] Evaluating the Usable-Security of Healthcare Software Through Unified Technique of Fuzzy Logic, ANP and TOPSIS
    Al-Zahrani, Fahad Ahmed
    [J]. IEEE ACCESS, 2020, 8 : 109905 - 109916
  • [8] Alazeb Abdulwahab, 2019, Security, Privacy, and Anonymity in Computation, Communication, and Storage. 12th International Conference, SpaCCS 2019. Proceedings: Lecture Notes in Computer Science (LNCS 11611), P63, DOI 10.1007/978-3-030-24907-6_6
  • [9] Evaluating the Impact of Software Security Tactics: A Design Perspective
    Alenezi, Mamdouh
    Pandey, Abhishek Kumar
    Verma, Richa
    Faizan, Mohd
    Chandra, Shalini
    Agrawal, Alka
    Kumar, Rajeev
    Khan, Raees Ahmad
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (03): : 2283 - 2299
  • [10] Intrusion detection in Edge-of-Things computing
    Almogren, Ahmad S.
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 : 259 - 265