Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture
- Autores
- Martínez Guevara, Layla M.; Vidal, Pablo Javier; Olivera, Ana Carolina; Millán, Emmanuel Nicolás
- Año de publicación
- 2024
- Idioma
- inglés
- Tipo de recurso
- artículo
- Estado
- versión publicada
- Descripción
- Due to the Internet of Things (IoT) widespread adoption, data traffic to cloud servers for analysis has surged, impacting IoT system latency. Fog Computing emerged as a solution, bringing processing capabilities closer to data generation points, reducing data sent to the cloud, and improving response times. However, it intensifies security concerns due to the proximity of sensitive data to users and limited node computational resources. This research aims to study encryption and data verification algorithms using various datasets and the cryptography software OpenSSL. Testing is performed on Raspberry Pi hardware, facilitating the implementation of Fog nodes. Metrics such as CPU, memory, and energy consumption are evaluated using scripts. Results show that data type does not influence algorithm choice, and patterns related to data size behaviour are identified, aiding in defining security strategies.
Fil: Martínez Guevara, Layla M.. Universidad de Mendoza; Argentina
Fil: Vidal, Pablo Javier. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina
Fil: Olivera, Ana Carolina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina
Fil: Millán, Emmanuel Nicolás. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina - Materia
-
FOG COMPUTING
SECURITY
CRYPTOGRAPHY - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
- Repositorio
.jpg)
- Institución
- Consejo Nacional de Investigaciones Científicas y Técnicas
- OAI Identificador
- oai:ri.conicet.gov.ar:11336/262532
Ver los metadatos del registro completo
| id |
CONICETDig_7c797029977c3004983b7b977c10a662 |
|---|---|
| oai_identifier_str |
oai:ri.conicet.gov.ar:11336/262532 |
| network_acronym_str |
CONICETDig |
| repository_id_str |
3498 |
| network_name_str |
CONICET Digital (CONICET) |
| spelling |
Analysis and comparison of encryption and verification algorithms applied to a Fog Computing ArchitectureMartínez Guevara, Layla M.Vidal, Pablo JavierOlivera, Ana CarolinaMillán, Emmanuel NicolásFOG COMPUTINGSECURITYCRYPTOGRAPHYhttps://purl.org/becyt/ford/1.2https://purl.org/becyt/ford/1Due to the Internet of Things (IoT) widespread adoption, data traffic to cloud servers for analysis has surged, impacting IoT system latency. Fog Computing emerged as a solution, bringing processing capabilities closer to data generation points, reducing data sent to the cloud, and improving response times. However, it intensifies security concerns due to the proximity of sensitive data to users and limited node computational resources. This research aims to study encryption and data verification algorithms using various datasets and the cryptography software OpenSSL. Testing is performed on Raspberry Pi hardware, facilitating the implementation of Fog nodes. Metrics such as CPU, memory, and energy consumption are evaluated using scripts. Results show that data type does not influence algorithm choice, and patterns related to data size behaviour are identified, aiding in defining security strategies.Fil: Martínez Guevara, Layla M.. Universidad de Mendoza; ArgentinaFil: Vidal, Pablo Javier. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; ArgentinaFil: Olivera, Ana Carolina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; ArgentinaFil: Millán, Emmanuel Nicolás. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; ArgentinaTaylor & Francis2024-10info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501info:ar-repo/semantics/articuloapplication/pdfapplication/pdfapplication/pdfhttp://hdl.handle.net/11336/262532Martínez Guevara, Layla M.; Vidal, Pablo Javier; Olivera, Ana Carolina; Millán, Emmanuel Nicolás; Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture; Taylor & Francis; Journal of Information and Telecommunication; 9; 2; 10-2024; 173-1892475-18392475-1847CONICET DigitalCONICETenginfo:eu-repo/semantics/altIdentifier/url/https://www.tandfonline.com/doi/full/10.1080/24751839.2024.2411884info:eu-repo/semantics/altIdentifier/doi/10.1080/24751839.2024.2411884info:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by-nc-sa/2.5/ar/reponame:CONICET Digital (CONICET)instname:Consejo Nacional de Investigaciones Científicas y Técnicas2025-10-15T14:51:09Zoai:ri.conicet.gov.ar:11336/262532instacron:CONICETInstitucionalhttp://ri.conicet.gov.ar/Organismo científico-tecnológicoNo correspondehttp://ri.conicet.gov.ar/oai/requestdasensio@conicet.gov.ar; lcarlino@conicet.gov.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:34982025-10-15 14:51:09.479CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicasfalse |
| dc.title.none.fl_str_mv |
Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture |
| title |
Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture |
| spellingShingle |
Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture Martínez Guevara, Layla M. FOG COMPUTING SECURITY CRYPTOGRAPHY |
| title_short |
Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture |
| title_full |
Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture |
| title_fullStr |
Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture |
| title_full_unstemmed |
Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture |
| title_sort |
Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture |
| dc.creator.none.fl_str_mv |
Martínez Guevara, Layla M. Vidal, Pablo Javier Olivera, Ana Carolina Millán, Emmanuel Nicolás |
| author |
Martínez Guevara, Layla M. |
| author_facet |
Martínez Guevara, Layla M. Vidal, Pablo Javier Olivera, Ana Carolina Millán, Emmanuel Nicolás |
| author_role |
author |
| author2 |
Vidal, Pablo Javier Olivera, Ana Carolina Millán, Emmanuel Nicolás |
| author2_role |
author author author |
| dc.subject.none.fl_str_mv |
FOG COMPUTING SECURITY CRYPTOGRAPHY |
| topic |
FOG COMPUTING SECURITY CRYPTOGRAPHY |
| purl_subject.fl_str_mv |
https://purl.org/becyt/ford/1.2 https://purl.org/becyt/ford/1 |
| dc.description.none.fl_txt_mv |
Due to the Internet of Things (IoT) widespread adoption, data traffic to cloud servers for analysis has surged, impacting IoT system latency. Fog Computing emerged as a solution, bringing processing capabilities closer to data generation points, reducing data sent to the cloud, and improving response times. However, it intensifies security concerns due to the proximity of sensitive data to users and limited node computational resources. This research aims to study encryption and data verification algorithms using various datasets and the cryptography software OpenSSL. Testing is performed on Raspberry Pi hardware, facilitating the implementation of Fog nodes. Metrics such as CPU, memory, and energy consumption are evaluated using scripts. Results show that data type does not influence algorithm choice, and patterns related to data size behaviour are identified, aiding in defining security strategies. Fil: Martínez Guevara, Layla M.. Universidad de Mendoza; Argentina Fil: Vidal, Pablo Javier. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina Fil: Olivera, Ana Carolina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina Fil: Millán, Emmanuel Nicolás. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina |
| description |
Due to the Internet of Things (IoT) widespread adoption, data traffic to cloud servers for analysis has surged, impacting IoT system latency. Fog Computing emerged as a solution, bringing processing capabilities closer to data generation points, reducing data sent to the cloud, and improving response times. However, it intensifies security concerns due to the proximity of sensitive data to users and limited node computational resources. This research aims to study encryption and data verification algorithms using various datasets and the cryptography software OpenSSL. Testing is performed on Raspberry Pi hardware, facilitating the implementation of Fog nodes. Metrics such as CPU, memory, and energy consumption are evaluated using scripts. Results show that data type does not influence algorithm choice, and patterns related to data size behaviour are identified, aiding in defining security strategies. |
| publishDate |
2024 |
| dc.date.none.fl_str_mv |
2024-10 |
| dc.type.none.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion http://purl.org/coar/resource_type/c_6501 info:ar-repo/semantics/articulo |
| format |
article |
| status_str |
publishedVersion |
| dc.identifier.none.fl_str_mv |
http://hdl.handle.net/11336/262532 Martínez Guevara, Layla M.; Vidal, Pablo Javier; Olivera, Ana Carolina; Millán, Emmanuel Nicolás; Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture; Taylor & Francis; Journal of Information and Telecommunication; 9; 2; 10-2024; 173-189 2475-1839 2475-1847 CONICET Digital CONICET |
| url |
http://hdl.handle.net/11336/262532 |
| identifier_str_mv |
Martínez Guevara, Layla M.; Vidal, Pablo Javier; Olivera, Ana Carolina; Millán, Emmanuel Nicolás; Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture; Taylor & Francis; Journal of Information and Telecommunication; 9; 2; 10-2024; 173-189 2475-1839 2475-1847 CONICET Digital CONICET |
| dc.language.none.fl_str_mv |
eng |
| language |
eng |
| dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/url/https://www.tandfonline.com/doi/full/10.1080/24751839.2024.2411884 info:eu-repo/semantics/altIdentifier/doi/10.1080/24751839.2024.2411884 |
| dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess https://creativecommons.org/licenses/by-nc-sa/2.5/ar/ |
| eu_rights_str_mv |
openAccess |
| rights_invalid_str_mv |
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/ |
| dc.format.none.fl_str_mv |
application/pdf application/pdf application/pdf |
| dc.publisher.none.fl_str_mv |
Taylor & Francis |
| publisher.none.fl_str_mv |
Taylor & Francis |
| dc.source.none.fl_str_mv |
reponame:CONICET Digital (CONICET) instname:Consejo Nacional de Investigaciones Científicas y Técnicas |
| reponame_str |
CONICET Digital (CONICET) |
| collection |
CONICET Digital (CONICET) |
| instname_str |
Consejo Nacional de Investigaciones Científicas y Técnicas |
| repository.name.fl_str_mv |
CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicas |
| repository.mail.fl_str_mv |
dasensio@conicet.gov.ar; lcarlino@conicet.gov.ar |
| _version_ |
1846083037359505408 |
| score |
13.22299 |