Visible to the public Biblio

Filters: Author is Agrawal, Alka  [Clear All Filters]
2021-06-28
Kaur, Jasleen, Agrawal, Alka, Khan, Raees Ahmad.  2020.  Security Assessment in Foggy Era through Analytical Hierarchy Process. 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT). :1–6.
Fog Computing provides users with the cloud facilities at the network edge. It may be assumed to be a virtual platform with adequate storage., computation and processing facilities for latency-sensitive applications. The basic difference lies with the fact that this platform is decentralized in nature. In addition., the fog systems or devices process data locally., are conveyable and are capable of being installed on heterogenous hardware. This versatility in its behavior and it being at the network edge turns the attention towards the security of the users sensitive data (in transition or at rest). In this paper., the authors have emphasized on the security of the fog level in typical Fog- IoT architecture. Various security factors (along with their subfactors) persisting at fog level are identified and discussed in detail. The authors have presented a hierarchy of fog computing security factors that is expected to help in considering security in a systematic and efficient manner. Further., the authors have also ranked the same through Analytical Hierarchy Process (AHP) and compared the results with Fuzzy-AHP (F-AHP). The results are found to be highly correlated.