학술논문

Advanced Data Segmentation and Encryption Approach using Fog Computing
Document Type
Conference
Source
2024 International Conference on Automation and Computation (AUTOCOM) Automation and Computation (AUTOCOM), 2024 International Conference on. :652-656 Mar, 2024
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Engineering Profession
Power, Energy and Industry Applications
Signal Processing and Analysis
Computer hacking
Computer network reliability
Computational modeling
Materials reliability
Nonhomogeneous media
Encryption
Safety
Data Segmentation
Data Security
Fish Algorithm
Fog Computing
Edge computing
Language
Abstract
Data security in conventional applications was only available at the application layer. Within the scope of the intended research, the safety of the merchandise is ensured. The deficiencies that are present in the security systems that are already in place have led to the realisation that a new security system is required. Considering that authentication is not present, the likelihood of decryption should be reduced. Establishing a decentralised security system is essential in order to protect against threats coming from a variety of digital networks. The new encryption standard is said to improve multilayer security, according to the claims. The material is split into two halves using this method, which also provides a reliable transmission mechanism. Because of the technology, hackers are unable to create vulnerabilities in the security system. There was a need for security in both the cloud and the edge environment in order to prevent intruders. Increasing the reliability and security of data transmission over a variety of networks was the motivation for the development of the two fish approach. Because of its security mechanism, it has been able to survive assaults from crackers and hackers. The paper that is being presented advises doing research on the safety of edge transmissions that are based on slicing. In order to prevent attackers from launching attacks from several networks, it is necessary to establish decentralised security. Layered security will help increase encryption standards, which is a significant benefit. Over the course of various investigations, computer security edge generators have been the focus of attention. Quite a few of them have already been extensively discussed. For the purpose of developing a reliable method of transmission, the proposed research splits the data into two parts, each of which is further encrypted at a different level. As a result of the development of multilayer encryption, the reliability and safety of data transmission via networks have been significantly enhanced. The security system became immune to hacker and cracker assaults as a result of the use of this technology.