Implementation of Homomorphic Encryption Schemes in Fog Computing
dc.contributor.author | Pandey, S. | |
dc.contributor.author | Bhushan, B. | |
dc.contributor.author | Hameed, A.A. | |
dc.contributor.author | Jamil, A. | |
dc.contributor.author | Juyal, A. | |
dc.date.accessioned | 2024-05-19T14:33:58Z | |
dc.date.available | 2024-05-19T14:33:58Z | |
dc.date.issued | 2024 | |
dc.department | İstinye Üniversitesi | en_US |
dc.description | 2nd International Conference on Computing, IoT and Data Analytics, ICCIDA 2023 -- 20 July 2023 through 21 July 2023 -- -- 308639 | en_US |
dc.description.abstract | In today's date, fog computing is on the rise due to its characteristics. Its ability to provide smart devices with close-by computing capabilities offers a drastic reduction in cloud traffic and more efficient data transfer. However, data security in fog computing devices is a major concern. Homomorphic Encryption (HME) Scheme is a technique that protects private data from various threats, and to improve efficiency and reduce time, it offers modification of original data after encryption without decrypting it. In this paper, we explore the various homomorphic encryption schemes that can be implemented in fog computing to protect the data and provide data security. We present a detailed architecture and various characteristics of fog computing to better visualize the use of homomorphic encryption in different areas. Further, we present the applications of homomorphic encryption in different sectors and discuss future research directions. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. | en_US |
dc.identifier.doi | 10.1007/978-3-031-53717-2_42 | |
dc.identifier.endpage | 464 | en_US |
dc.identifier.isbn | 9783031537165 | |
dc.identifier.issn | 1860-949X | |
dc.identifier.scopus | 2-s2.0-85187976538 | en_US |
dc.identifier.scopusquality | N/A | en_US |
dc.identifier.startpage | 455 | en_US |
dc.identifier.uri | https://doi.org/10.1007/978-3-031-53717-2_42 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12713/4382 | |
dc.identifier.volume | 1145 SCI | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer Science and Business Media Deutschland GmbH | en_US |
dc.relation.ispartof | Studies in Computational Intelligence | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.snmz | 20240519_ka | en_US |
dc.subject | Fog Computing | en_US |
dc.subject | Homomorphic Encryption Schemes | en_US |
dc.title | Implementation of Homomorphic Encryption Schemes in Fog Computing | en_US |
dc.type | Conference Object | en_US |