Visible to the public Security Assessment in Foggy Era through Analytical Hierarchy Process

TitleSecurity Assessment in Foggy Era through Analytical Hierarchy Process
Publication TypeConference Paper
Year of Publication2020
AuthorsKaur, Jasleen, Agrawal, Alka, Khan, Raees Ahmad
Conference Name2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
Date Publishedjul
Keywordscloud computing, edge computing, Fog Computing, Fog Computing and Security, Hierarchy, Internet of Things, Internet of Things (IoT), privacy, Protocols, pubcrawl, Real-time Systems, Resiliency, Scalability, security
AbstractFog Computing provides users with the cloud facilities at the network edge. It may be assumed to be a virtual platform with adequate storage., computation and processing facilities for latency-sensitive applications. The basic difference lies with the fact that this platform is decentralized in nature. In addition., the fog systems or devices process data locally., are conveyable and are capable of being installed on heterogenous hardware. This versatility in its behavior and it being at the network edge turns the attention towards the security of the users sensitive data (in transition or at rest). In this paper., the authors have emphasized on the security of the fog level in typical Fog- IoT architecture. Various security factors (along with their subfactors) persisting at fog level are identified and discussed in detail. The authors have presented a hierarchy of fog computing security factors that is expected to help in considering security in a systematic and efficient manner. Further., the authors have also ranked the same through Analytical Hierarchy Process (AHP) and compared the results with Fuzzy-AHP (F-AHP). The results are found to be highly correlated.
DOI10.1109/ICCCNT49239.2020.9225308
Citation Keykaur_security_2020