Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture

Autores
Martínez Guevara, Layla M.; Vidal, Pablo Javier; Olivera, Ana Carolina; Millán, Emmanuel Nicolás
Año de publicación
2024
Idioma
inglés
Tipo de recurso
artículo
Estado
versión publicada
Descripción
Due to the Internet of Things (IoT) widespread adoption, data traffic to cloud servers for analysis has surged, impacting IoT system latency. Fog Computing emerged as a solution, bringing processing capabilities closer to data generation points, reducing data sent to the cloud, and improving response times. However, it intensifies security concerns due to the proximity of sensitive data to users and limited node computational resources. This research aims to study encryption and data verification algorithms using various datasets and the cryptography software OpenSSL. Testing is performed on Raspberry Pi hardware, facilitating the implementation of Fog nodes. Metrics such as CPU, memory, and energy consumption are evaluated using scripts. Results show that data type does not influence algorithm choice, and patterns related to data size behaviour are identified, aiding in defining security strategies.
Fil: Martínez Guevara, Layla M.. Universidad de Mendoza; Argentina
Fil: Vidal, Pablo Javier. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina
Fil: Olivera, Ana Carolina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina
Fil: Millán, Emmanuel Nicolás. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina
Materia
FOG COMPUTING
SECURITY
CRYPTOGRAPHY
Nivel de accesibilidad
acceso abierto
Condiciones de uso
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
Repositorio
CONICET Digital (CONICET)
Institución
Consejo Nacional de Investigaciones Científicas y Técnicas
OAI Identificador
oai:ri.conicet.gov.ar:11336/262532

id CONICETDig_7c797029977c3004983b7b977c10a662
oai_identifier_str oai:ri.conicet.gov.ar:11336/262532
network_acronym_str CONICETDig
repository_id_str 3498
network_name_str CONICET Digital (CONICET)
spelling Analysis and comparison of encryption and verification algorithms applied to a Fog Computing ArchitectureMartínez Guevara, Layla M.Vidal, Pablo JavierOlivera, Ana CarolinaMillán, Emmanuel NicolásFOG COMPUTINGSECURITYCRYPTOGRAPHYhttps://purl.org/becyt/ford/1.2https://purl.org/becyt/ford/1Due to the Internet of Things (IoT) widespread adoption, data traffic to cloud servers for analysis has surged, impacting IoT system latency. Fog Computing emerged as a solution, bringing processing capabilities closer to data generation points, reducing data sent to the cloud, and improving response times. However, it intensifies security concerns due to the proximity of sensitive data to users and limited node computational resources. This research aims to study encryption and data verification algorithms using various datasets and the cryptography software OpenSSL. Testing is performed on Raspberry Pi hardware, facilitating the implementation of Fog nodes. Metrics such as CPU, memory, and energy consumption are evaluated using scripts. Results show that data type does not influence algorithm choice, and patterns related to data size behaviour are identified, aiding in defining security strategies.Fil: Martínez Guevara, Layla M.. Universidad de Mendoza; ArgentinaFil: Vidal, Pablo Javier. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; ArgentinaFil: Olivera, Ana Carolina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; ArgentinaFil: Millán, Emmanuel Nicolás. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; ArgentinaTaylor & Francis2024-10info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501info:ar-repo/semantics/articuloapplication/pdfapplication/pdfapplication/pdfhttp://hdl.handle.net/11336/262532Martínez Guevara, Layla M.; Vidal, Pablo Javier; Olivera, Ana Carolina; Millán, Emmanuel Nicolás; Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture; Taylor & Francis; Journal of Information and Telecommunication; 9; 2; 10-2024; 173-1892475-18392475-1847CONICET DigitalCONICETenginfo:eu-repo/semantics/altIdentifier/url/https://www.tandfonline.com/doi/full/10.1080/24751839.2024.2411884info:eu-repo/semantics/altIdentifier/doi/10.1080/24751839.2024.2411884info:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by-nc-sa/2.5/ar/reponame:CONICET Digital (CONICET)instname:Consejo Nacional de Investigaciones Científicas y Técnicas2025-10-15T14:51:09Zoai:ri.conicet.gov.ar:11336/262532instacron:CONICETInstitucionalhttp://ri.conicet.gov.ar/Organismo científico-tecnológicoNo correspondehttp://ri.conicet.gov.ar/oai/requestdasensio@conicet.gov.ar; lcarlino@conicet.gov.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:34982025-10-15 14:51:09.479CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicasfalse
dc.title.none.fl_str_mv Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture
title Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture
spellingShingle Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture
Martínez Guevara, Layla M.
FOG COMPUTING
SECURITY
CRYPTOGRAPHY
title_short Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture
title_full Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture
title_fullStr Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture
title_full_unstemmed Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture
title_sort Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture
dc.creator.none.fl_str_mv Martínez Guevara, Layla M.
Vidal, Pablo Javier
Olivera, Ana Carolina
Millán, Emmanuel Nicolás
author Martínez Guevara, Layla M.
author_facet Martínez Guevara, Layla M.
Vidal, Pablo Javier
Olivera, Ana Carolina
Millán, Emmanuel Nicolás
author_role author
author2 Vidal, Pablo Javier
Olivera, Ana Carolina
Millán, Emmanuel Nicolás
author2_role author
author
author
dc.subject.none.fl_str_mv FOG COMPUTING
SECURITY
CRYPTOGRAPHY
topic FOG COMPUTING
SECURITY
CRYPTOGRAPHY
purl_subject.fl_str_mv https://purl.org/becyt/ford/1.2
https://purl.org/becyt/ford/1
dc.description.none.fl_txt_mv Due to the Internet of Things (IoT) widespread adoption, data traffic to cloud servers for analysis has surged, impacting IoT system latency. Fog Computing emerged as a solution, bringing processing capabilities closer to data generation points, reducing data sent to the cloud, and improving response times. However, it intensifies security concerns due to the proximity of sensitive data to users and limited node computational resources. This research aims to study encryption and data verification algorithms using various datasets and the cryptography software OpenSSL. Testing is performed on Raspberry Pi hardware, facilitating the implementation of Fog nodes. Metrics such as CPU, memory, and energy consumption are evaluated using scripts. Results show that data type does not influence algorithm choice, and patterns related to data size behaviour are identified, aiding in defining security strategies.
Fil: Martínez Guevara, Layla M.. Universidad de Mendoza; Argentina
Fil: Vidal, Pablo Javier. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina
Fil: Olivera, Ana Carolina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina
Fil: Millán, Emmanuel Nicolás. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina
description Due to the Internet of Things (IoT) widespread adoption, data traffic to cloud servers for analysis has surged, impacting IoT system latency. Fog Computing emerged as a solution, bringing processing capabilities closer to data generation points, reducing data sent to the cloud, and improving response times. However, it intensifies security concerns due to the proximity of sensitive data to users and limited node computational resources. This research aims to study encryption and data verification algorithms using various datasets and the cryptography software OpenSSL. Testing is performed on Raspberry Pi hardware, facilitating the implementation of Fog nodes. Metrics such as CPU, memory, and energy consumption are evaluated using scripts. Results show that data type does not influence algorithm choice, and patterns related to data size behaviour are identified, aiding in defining security strategies.
publishDate 2024
dc.date.none.fl_str_mv 2024-10
dc.type.none.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
http://purl.org/coar/resource_type/c_6501
info:ar-repo/semantics/articulo
format article
status_str publishedVersion
dc.identifier.none.fl_str_mv http://hdl.handle.net/11336/262532
Martínez Guevara, Layla M.; Vidal, Pablo Javier; Olivera, Ana Carolina; Millán, Emmanuel Nicolás; Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture; Taylor & Francis; Journal of Information and Telecommunication; 9; 2; 10-2024; 173-189
2475-1839
2475-1847
CONICET Digital
CONICET
url http://hdl.handle.net/11336/262532
identifier_str_mv Martínez Guevara, Layla M.; Vidal, Pablo Javier; Olivera, Ana Carolina; Millán, Emmanuel Nicolás; Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture; Taylor & Francis; Journal of Information and Telecommunication; 9; 2; 10-2024; 173-189
2475-1839
2475-1847
CONICET Digital
CONICET
dc.language.none.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv info:eu-repo/semantics/altIdentifier/url/https://www.tandfonline.com/doi/full/10.1080/24751839.2024.2411884
info:eu-repo/semantics/altIdentifier/doi/10.1080/24751839.2024.2411884
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
eu_rights_str_mv openAccess
rights_invalid_str_mv https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
dc.format.none.fl_str_mv application/pdf
application/pdf
application/pdf
dc.publisher.none.fl_str_mv Taylor & Francis
publisher.none.fl_str_mv Taylor & Francis
dc.source.none.fl_str_mv reponame:CONICET Digital (CONICET)
instname:Consejo Nacional de Investigaciones Científicas y Técnicas
reponame_str CONICET Digital (CONICET)
collection CONICET Digital (CONICET)
instname_str Consejo Nacional de Investigaciones Científicas y Técnicas
repository.name.fl_str_mv CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicas
repository.mail.fl_str_mv dasensio@conicet.gov.ar; lcarlino@conicet.gov.ar
_version_ 1846083037359505408
score 13.22299