A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing

被引:0
|
作者
Priyanka Rajan Kumar [1 ]
Sonia Goel [1 ]
机构
[1] Punjabi University,Department of Computer Science
关键词
Fog computing; ECC algorithm; AES algorithm; Adaptive encryption; Machine learning;
D O I
10.1038/s41598-025-92245-9
中图分类号
学科分类号
摘要
Fog computing, as a crucial component of the edge computing paradigm, offers significant advantages in terms of reduced latency and real-time processing. However, its distributed and heterogeneous nature presents distinct security challenges. This research introduces a novel adaptive encryption framework powered by machine learning to address these security concerns. The proposed system dynamically selects and adjusts encryption methods and key strengths based on data sensitivity and the communication context, ensuring a balance between security and performance. The system employs the K-Nearest Neighbors (KNN) classification algorithm to categorize data into sensitive and normal types. For sensitive data, a hybrid encryption approach combining Elliptic Curve Cryptography (ECC) and Advanced Encryption Standard (AES) is applied, ensuring secure key derivation and strong cryptographic protection. For normal data, the system uses standard AES encryption, achieving processing efficiency while maintaining adequate security levels. The effectiveness of the proposed system has been validated through a comprehensive set of experiments, including evaluations of Encryption Time, Decryption Time, Encryption Throughput, Decryption Throughput, and Histogram Analysis. Additionally, we assess security through the Number of Pixels Change Rate (NPCR = 99.349%) and Unified Average Changing Intensity (UACI = 33.079%). The scalability of the system has been thoroughly validated using datasets of varying sizes (1kB, 100kB, and 1000 kB) with variability achieved through the use of both text and image datasets. These evaluations demonstrate the system’s adaptability and performance consistency across diverse data transmission scenarios, making it suitable for large-scale fog environments. The results collectively demonstrate that the adaptive encryption methodology significantly enhances security while maintaining efficiency in data transmission and processing within fog computing environments.
引用
收藏
相关论文
共 50 条
  • [21] Intelligent manufacturing Lie Group Machine Learning: real-time and efficient inspection system based on fog computing
    Chengjun Xu
    Guobin Zhu
    Journal of Intelligent Manufacturing, 2021, 32 : 237 - 249
  • [22] An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios
    Tian, Jun-Feng
    Wang, Hao-Ning
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [23] ENCRYPTION AS A SERVICE FOR SECURING DATA IN MOBILE CLOUD COMPUTING
    Mouhib, Ibtihal
    Driss, El Ouadghiri
    Zine-Dine, Khalid
    2015 15TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2015, : 546 - 550
  • [24] Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption
    Wang, Na
    Zhou, Wen
    Wang, Jingjing
    Guo, Yifan
    Fu, Junsong
    Liu, Jianwei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2454 - 2469
  • [25] Research on efficient data processing method for fog computing based on blockchain and federated learning
    Kang, Haiyan
    Wu, Bing
    Cao, Yiran
    NEUROCOMPUTING, 2025, 626
  • [26] Securing Smart Contracts in Fog Computing: Machine Learning-Based Attack Detection for Registration and Resource Access Granting
    Ehsan, Tahmina
    Sana, Muhammad Usman
    Ali, Muhammad Usman
    Montero, Elizabeth Caro
    Alvarado, Eduardo Silva
    Djuraev, Sirojiddin
    Ashraf, Imran
    IEEE ACCESS, 2024, 12 : 42802 - 42815
  • [27] A Secure Data Aggregation Protocol for Fog Computing Based Smart Grids
    Okay, Feyza Yildirim
    Ozdemir, Suat
    PROCEEDINGS 2018 IEEE 12TH INTERNATIONAL CONFERENCE ON COMPATIBILITY, POWER ELECTRONICS AND POWER ENGINEERING (CPE-POWERENG 2018), 2018,
  • [28] Blowfish Hybridized Weighted Attribute-Based Encryption for Secure and Efficient Data Collaboration in Cloud Computing
    Ghosh, Smarajit
    Karar, Vinod
    APPLIED SCIENCES-BASEL, 2018, 8 (07):
  • [29] Implementation of entropically secure encryption: Securing personal health data
    Temel, Mehmet Huseyin
    Skoric, Boris
    Monroy, Idelfonso Tafur
    ELECTRONICS LETTERS, 2024, 60 (22)
  • [30] Adaptively secure multi-authority attribute-based broadcast encryption in fog computing
    Chen, Jie
    Niu, Jiaxu
    Lei, Hao
    Lin, Li
    Ling, Yunhao
    COMPUTER NETWORKS, 2023, 232