A neutrosophic AHP-based computational technique for security management in a fog computing network

被引:5
作者
Kaur, Jasleen [1 ]
Kumar, Rajeev [2 ]
Agrawal, Alka [1 ]
Khan, Raees Ahmad [1 ]
机构
[1] Babasaheb Bhimrao Ambedkar Univ, Dept Informat Technol, Lucknow, Uttar Pradesh, India
[2] Adm Staff Coll India, Ctr Innovat & Technol, Hyderabad, India
关键词
Fog computing; Security; Neutrosophic set; Single-valued neutrosophic set; Analytical hierarchy process; GROUP DECISION-MAKING; PRESERVING ACCESS-CONTROL; TOPSIS METHOD; SINGLE; PRIVACY; FRAMEWORK; SOFTWARE; SETS;
D O I
10.1007/s11227-022-04674-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet-enabled devices are deployed by individuals for almost every task. The concept of cloud computing has proven to be beneficial for users as the processing, storage and analysis of data are performed at the cloud level. However, in the case of latency-sensitive applications, the notion is called-off as the overall response time is high. In this situation, fog computing outperforms the cloud. With fog computing, the necessary computations are performed at the edge of the network, and thus, latency is highly reduced. In parallel, the increase in smart devices around the globe has led to a considerable increase in sensitive user data across the Web, which needs to be secured. Furthermore, multidimensional security depends on various factors whose prioritization plays an important role in addressing security issues. In this context, the authors identify various fog computing security factors and their corresponding subfactors. The identified factors are evaluated for their impact on security at the fog level through the neutrosophic-analytical hierarchy process. Moreover, to corroborate the effectiveness of the proposed technique, the results obtained are compared to the results from conventional approaches such as Fuzzy-AHP and Classical-AHP and are found to be statistically correlated. The proposed mechanism can be used by security practitioners to systematically manage fog computing security factors.
引用
收藏
页码:295 / 320
页数:26
相关论文
共 58 条
  • [21] Efficient and privacy preserving access control scheme for fog-enabled IoT
    Fan, Kai
    Xu, Huiyue
    Gao, Longxiang
    Li, Hui
    Yang, Yintang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 99 : 134 - 142
  • [22] On Neutrosophic Sets and Topology
    Gallego Lupianez, Francisco
    [J]. 9TH INTERNATIONAL CONFERENCE ON THEORY AND APPLICATION OF SOFT COMPUTING, COMPUTING WITH WORDS AND PERCEPTION, ICSCCW 2017, 2017, 120 : 975 - 982
  • [23] Hinduja Akshay, 2020, Intelligent Communication, Control and Devices. Proceedings of ICICCD 2018. Advances in Intelligent Systems and Computing (AISC 989), P243, DOI 10.1007/978-981-13-8618-3_26
  • [24] Kahraman C., 2019, Fuzzy Multi-criteria Decision-Making Using Neutrosophic Sets, P623, DOI DOI 10.1007/978-3-030-00045-5_24
  • [25] Single & interval-valued neutrosophic AHP methods: Performance analysis of outsourcing law firms
    Kahraman, Cengiz
    Oztaysi, Basar
    Onar, Sezi Cevik
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (01) : 749 - 759
  • [26] Kaur Jasleen, 2022, Proceedings of First International Conference on Computational Electronics for Wireless Communications: ICCWC 2021. Lecture Notes in Networks and Systems (329), P535, DOI 10.1007/978-981-16-6246-1_45
  • [27] Kaur J., 2021, FOG COMPUTING HEALTH, P79, DOI DOI 10.1007/978-3-030-46197-3_4
  • [28] Encryfuscation: A model for preserving data and location privacy in fog based IoT scenario
    Kaur, Jasleen
    Agrawal, Alka
    Khan, Raees Ahmad
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (09) : 6808 - 6817
  • [29] Security Issues in Fog Environment: A Systematic Literature Review
    Kaur, Jasleen
    Agrawal, Alka
    Khan, Raees Ahmad
    [J]. INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (03) : 467 - 483
  • [30] INFORMATION SECURITY MANAGEMENT FRAMEWORK SUITABILITY ESTIMATION FOR SMALL AND MEDIUM ENTERPRISE
    Kauspadiene, Laima
    Ramanauskaite, Simona
    Cenys, Antanas
    [J]. TECHNOLOGICAL AND ECONOMIC DEVELOPMENT OF ECONOMY, 2019, 25 (05) : 979 - 997