A neutrosophic AHP-based computational technique for security management in a fog computing network

被引:5
作者
Kaur, Jasleen [1 ]
Kumar, Rajeev [2 ]
Agrawal, Alka [1 ]
Khan, Raees Ahmad [1 ]
机构
[1] Babasaheb Bhimrao Ambedkar Univ, Dept Informat Technol, Lucknow, Uttar Pradesh, India
[2] Adm Staff Coll India, Ctr Innovat & Technol, Hyderabad, India
关键词
Fog computing; Security; Neutrosophic set; Single-valued neutrosophic set; Analytical hierarchy process; GROUP DECISION-MAKING; PRESERVING ACCESS-CONTROL; TOPSIS METHOD; SINGLE; PRIVACY; FRAMEWORK; SOFTWARE; SETS;
D O I
10.1007/s11227-022-04674-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet-enabled devices are deployed by individuals for almost every task. The concept of cloud computing has proven to be beneficial for users as the processing, storage and analysis of data are performed at the cloud level. However, in the case of latency-sensitive applications, the notion is called-off as the overall response time is high. In this situation, fog computing outperforms the cloud. With fog computing, the necessary computations are performed at the edge of the network, and thus, latency is highly reduced. In parallel, the increase in smart devices around the globe has led to a considerable increase in sensitive user data across the Web, which needs to be secured. Furthermore, multidimensional security depends on various factors whose prioritization plays an important role in addressing security issues. In this context, the authors identify various fog computing security factors and their corresponding subfactors. The identified factors are evaluated for their impact on security at the fog level through the neutrosophic-analytical hierarchy process. Moreover, to corroborate the effectiveness of the proposed technique, the results obtained are compared to the results from conventional approaches such as Fuzzy-AHP and Classical-AHP and are found to be statistically correlated. The proposed mechanism can be used by security practitioners to systematically manage fog computing security factors.
引用
收藏
页码:295 / 320
页数:26
相关论文
共 58 条
  • [41] Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing
    Puthal, Deepak
    Obaidat, Mohammad S.
    Nanda, Priyadarsi
    Prasad, Mukesh
    Mohanty, Saraju P.
    Zomaya, Albert Y.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (05) : 60 - 65
  • [42] Radwan N.M., 2016, Infinite Study
  • [43] Sahin R., 2014, ARXIV14125202
  • [44] Fog computing: from architecture to edge computing and big data processing
    Singh, Simar Preet
    Nayyar, Anand
    Kumar, Rajesh
    Sharma, Anju
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (04) : 2070 - 2105
  • [45] Singh V., 2020, COMMUNICATIONS-GER, V14, P15
  • [46] Smarandache F, 1998, NEUTROSOPHY NEUTROSO
  • [47] A Novel Neutrosophic Data Analytic Hierarchy Process for Multi-Criteria Decision Making Method: A Case Study in Kuala Lumpur Stock Exchange
    Tey, Desmond Jun Yi
    Gan, Yee Fei
    Selvachandran, Ganeshsree
    Quek, Shio Gai
    Smarandache, Florentin
    Le Hoang Son
    Abdel-Basset, Mohamed
    Hoang Viet Long
    [J]. IEEE ACCESS, 2019, 7 : 53687 - 53697
  • [48] Dang TD, 2017, 2017 SECOND INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P32, DOI 10.1109/FMEC.2017.7946404
  • [49] Information Security Risk Assessment in Critical Infrastructure: A Hybrid MCDM Approach
    Turskis, Zenonas
    Goranin, Nikolaj
    Nurusheva, Assel
    Boranbayev, Seilkhan
    [J]. INFORMATICA, 2019, 30 (01) : 187 - 211
  • [50] Verma R., 2019, INT J COMPUT SCI ENG, V7, P367, DOI DOI 10.26438/IJCSE/V7I5.367370