Secure authentication scheme with Archimedes optimization algorithm for load balancing technique in fog computing

被引:0
|
作者
N. Premkumar
R. Santhosh
机构
[1] Karpagam Academy of Higher Education,Department of Computer Science and Engineering, Faculty of Engineering
关键词
Fog computing; Security enhancement; Data access control; EDC; Internet of things; Archimedes optimization algorithm;
D O I
10.1007/s41870-024-01861-7
中图分类号
学科分类号
摘要
In this paper, to develop an efficient secure authentication scheme and load balancing technique in fog computing. To achieve an efficient secure authentical scheme in addition load balancing method in fog computing, Hybrid Edge DataCenters (HEDC) is developed in this paper. Normally, the EDC can be utilized to set up as a distributed system in addition it is located among the data source and cloud datacentre. This EDC network is also placed in the intermediate layer in the fog hierarchy among cloud datacentres in addition Internet of Things (IoT). This EDC is operated as an intermediate layer in fog computing which is responsible for load balancers and secure authentication in distributing the workload. This EDC fails to achieve efficient secure authentication and manage the workload in fog computing. So, the proposed HEDC is utilized to enable efficient authentication and workload management (load balancing). The proposed method is a combination of EDC and Archimedes Optimization Algorithm (AOA). Based on resource utilization and response time, efficient load balancing is achieved. Additionally, the secure authentication scheme is also attained with the assistance of the HEDC.
引用
收藏
页码:3861 / 3869
页数:8
相关论文
共 50 条
  • [1] Pelican optimization algorithm with blockchain for secure load balancing in fog computing
    Premkumar, N.
    Santhosh, R.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (18) : 53417 - 53439
  • [2] Pelican optimization algorithm with blockchain for secure load balancing in fog computing
    N. Premkumar
    R. Santhosh
    [J]. Multimedia Tools and Applications, 2024, 83 : 53417 - 53439
  • [3] Secure Load Balancing in Fog Computing Using improved Tasmanian Devil Optimization Algorithm with Blockchain
    Premkumar, N.
    Santhosh, R.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2024, 136 (01) : 547 - 565
  • [4] A Load Balancing Algorithm for Fog Computing Environments
    Pereira, Eder
    Fischer, Ivania A.
    Medina, Roseclea D.
    Carreno, Emmanuell D.
    Padoin, Edson Luiz
    [J]. HIGH PERFORMANCE COMPUTING, CARLA 2019, 2020, 1087 : 65 - 77
  • [5] A clogging resistant secure authentication scheme for fog computing services
    Ali, Zeeshan
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Garg, Sahil
    Lv, Zhihan
    Bin Zikria, Yousaf
    [J]. COMPUTER NETWORKS, 2021, 185
  • [6] Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
    Huang, Baiyi
    Cheng, Xiuzhen
    Cao, Yuan
    Zhang, Le
    [J]. 2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 433 - 439
  • [7] FogSec: A secure and effective mutual authentication scheme for fog computing
    Sree, Thankaraja Raja
    Harish, R.
    Veni, T.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (12):
  • [8] Energy-Efficient and Secure Load Balancing Technique for SDN-Enabled Fog Computing
    Singh, Jagdeep
    Singh, Parminder
    Amhoud, El Mehdi
    Hedabou, Mustapha
    [J]. SUSTAINABILITY, 2022, 14 (19)
  • [9] Hill Climbing Load Balancing Algorithm on Fog Computing
    Zahid, Maheen
    Javaid, Nadeem
    Ansar, Kainat
    Hassan, Kanza
    Khan, Muhammad KaleemUllah
    Waqas, Mohammad
    [J]. ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 3PGCIC-2018, 2019, 24 : 238 - 251
  • [10] Adaptive probabilistic neural network based edge data center authentication for secure load balancing in fog computing
    Gowri, V.
    Baranidharan, B.
    [J]. Applied Soft Computing, 2025, 169