Advanced Data Segmentation and Encryption Approach using Fog Computing

Kamred Udham Singh,Neeraj Varshney, Pushpendra Kumar, Pradeep Kumar Sharma, Umang Deep Mishra,Teekam Singh

2024 International Conference on Automation and Computation (AUTOCOM)(2024)

引用 0|浏览0
暂无评分
摘要
Data security in conventional applications was only available at the application layer. Within the scope of the intended research, the safety of the merchandise is ensured. The deficiencies that are present in the security systems that are already in place have led to the realisation that a new security system is required. Considering that authentication is not present, the likelihood of decryption should be reduced. Establishing a decentralised security system is essential in order to protect against threats coming from a variety of digital networks. The new encryption standard is said to improve multilayer security, according to the claims. The material is split into two halves using this method, which also provides a reliable transmission mechanism. Because of the technology, hackers are unable to create vulnerabilities in the security system. There was a need for security in both the cloud and the edge environment in order to prevent intruders. Increasing the reliability and security of data transmission over a variety of networks was the motivation for the development of the two fish approach. Because of its security mechanism, it has been able to survive assaults from crackers and hackers. The paper that is being presented advises doing research on the safety of edge transmissions that are based on slicing. In order to prevent attackers from launching attacks from several networks, it is necessary to establish decentralised security. Layered security will help increase encryption standards, which is a significant benefit. Over the course of various investigations, computer security edge generators have been the focus of attention. Quite a few of them have already been extensively discussed. For the purpose of developing a reliable method of transmission, the proposed research splits the data into two parts, each of which is further encrypted at a different level. As a result of the development of multilayer encryption, the reliability and safety of data transmission via networks have been significantly enhanced. The security system became immune to hacker and cracker assaults as a result of the use of this technology.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要