Security analysis of fog computing environment for ensuring the security and privacy of information.
Kamal Kumar GolaShikha AryaGulista KhanChetna DevkarNishant ChaurasiaPublished in: Trans. Emerg. Telecommun. Technol. (2023)
Keyphrases
- security analysis
- computing environments
- security properties
- security requirements
- private information
- privacy concerns
- security model
- information sharing
- smart card
- information flow
- sensitive data
- personal data
- mutual authentication
- low cost
- individual privacy
- high security
- encryption algorithm
- statistical databases
- sensitive information
- intrusion detection
- intelligent systems