A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing

被引:0
|
作者
Priyanka Rajan Kumar [1 ]
Sonia Goel [1 ]
机构
[1] Punjabi University,Department of Computer Science
关键词
Fog computing; ECC algorithm; AES algorithm; Adaptive encryption; Machine learning;
D O I
10.1038/s41598-025-92245-9
中图分类号
学科分类号
摘要
Fog computing, as a crucial component of the edge computing paradigm, offers significant advantages in terms of reduced latency and real-time processing. However, its distributed and heterogeneous nature presents distinct security challenges. This research introduces a novel adaptive encryption framework powered by machine learning to address these security concerns. The proposed system dynamically selects and adjusts encryption methods and key strengths based on data sensitivity and the communication context, ensuring a balance between security and performance. The system employs the K-Nearest Neighbors (KNN) classification algorithm to categorize data into sensitive and normal types. For sensitive data, a hybrid encryption approach combining Elliptic Curve Cryptography (ECC) and Advanced Encryption Standard (AES) is applied, ensuring secure key derivation and strong cryptographic protection. For normal data, the system uses standard AES encryption, achieving processing efficiency while maintaining adequate security levels. The effectiveness of the proposed system has been validated through a comprehensive set of experiments, including evaluations of Encryption Time, Decryption Time, Encryption Throughput, Decryption Throughput, and Histogram Analysis. Additionally, we assess security through the Number of Pixels Change Rate (NPCR = 99.349%) and Unified Average Changing Intensity (UACI = 33.079%). The scalability of the system has been thoroughly validated using datasets of varying sizes (1kB, 100kB, and 1000 kB) with variability achieved through the use of both text and image datasets. These evaluations demonstrate the system’s adaptability and performance consistency across diverse data transmission scenarios, making it suitable for large-scale fog environments. The results collectively demonstrate that the adaptive encryption methodology significantly enhances security while maintaining efficiency in data transmission and processing within fog computing environments.
引用
收藏
相关论文
共 50 条
  • [31] Distributed Data Platform for Machine Learning Using the Fog Computing Model
    Tsuchiya T.
    Mochizuki R.
    Hirose H.
    Yamada T.
    Koyanagi K.
    Minh Tran Q.
    SN Computer Science, 2020, 1 (3)
  • [32] Adaptive probabilistic neural network based edge data center authentication for secure load balancing in fog computing
    Gowri, V.
    Baranidharan, B.
    APPLIED SOFT COMPUTING, 2025, 169
  • [33] Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption
    Kurniawan, Agus
    Kyas, Marcel
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 30 - 34
  • [34] Machine Learning Method Based on Stream Homomorphic Encryption Computing
    Zhang, Yizhuo
    Liu, Yiwei
    Chung, Chan-Liang
    Wei, Yu-Chih
    Chen, Chi-Hua
    2020 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TAIWAN), 2020,
  • [35] An efficient and secure aggregation encryption scheme in edge computing
    Wu, Junhua
    Sheng, Xiaofei
    Li, Guangshun
    Yu, Kan
    Liu, Junke
    CHINA COMMUNICATIONS, 2022, 19 (03) : 245 - 257
  • [36] An Efficient and Secure Aggregation Encryption Scheme in Edge Computing
    Junhua Wu
    Xiaofei Sheng
    Guangshun Li
    Kan Yu
    Junke Liu
    China Communications, 2022, 19 (03) : 245 - 257
  • [37] Machine Learning Based Power Efficient Optimized Communication Ensemble Model with Intelligent Fog Computing for WSNs
    Jain, Abhishek
    Bhardwaj, Amit Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 131 (01) : 415 - 429
  • [38] Machine Learning Based Power Efficient Optimized Communication Ensemble Model with Intelligent Fog Computing for WSNs
    Abhishek Jain
    Amit Kumar Bhardwaj
    Wireless Personal Communications, 2023, 131 : 415 - 429
  • [39] Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment
    Alzubi, Omar A.
    Alzubi, Jafar A.
    Alazab, Moutaz
    Alrabea, Adnan
    Awajan, Albara
    Qiqieh, Issa
    ELECTRONICS, 2022, 11 (19)
  • [40] Secure Data Query Framework for Cloud and Fog Computing
    Gu, Ke
    Wu, Na
    Yin, Bo
    Jia, Weijia
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01): : 332 - 345