Mostrar el registro sencillo del ítem

dc.contributor.author
Martínez Guevara, Layla M.  
dc.contributor.author
Vidal, Pablo Javier  
dc.contributor.author
Olivera, Ana Carolina  
dc.contributor.author
Millán, Emmanuel Nicolás  
dc.date.available
2025-05-26T10:18:29Z  
dc.date.issued
2024-10  
dc.identifier.citation
Martínez Guevara, Layla M.; Vidal, Pablo Javier; Olivera, Ana Carolina; Millán, Emmanuel Nicolás; Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture; Taylor & Francis; Journal of Information and Telecommunication; 9; 2; 10-2024; 173-189  
dc.identifier.issn
2475-1839  
dc.identifier.uri
http://hdl.handle.net/11336/262532  
dc.description.abstract
Due to the Internet of Things (IoT) widespread adoption, data traffic to cloud servers for analysis has surged, impacting IoT system latency. Fog Computing emerged as a solution, bringing processing capabilities closer to data generation points, reducing data sent to the cloud, and improving response times. However, it intensifies security concerns due to the proximity of sensitive data to users and limited node computational resources. This research aims to study encryption and data verification algorithms using various datasets and the cryptography software OpenSSL. Testing is performed on Raspberry Pi hardware, facilitating the implementation of Fog nodes. Metrics such as CPU, memory, and energy consumption are evaluated using scripts. Results show that data type does not influence algorithm choice, and patterns related to data size behaviour are identified, aiding in defining security strategies.  
dc.format
application/pdf  
dc.language.iso
eng  
dc.publisher
Taylor & Francis  
dc.rights
info:eu-repo/semantics/openAccess  
dc.rights.uri
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/  
dc.subject
FOG COMPUTING  
dc.subject
SECURITY  
dc.subject
CRYPTOGRAPHY  
dc.subject.classification
Ciencias de la Computación  
dc.subject.classification
Ciencias de la Computación e Información  
dc.subject.classification
CIENCIAS NATURALES Y EXACTAS  
dc.title
Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture  
dc.type
info:eu-repo/semantics/article  
dc.type
info:ar-repo/semantics/artículo  
dc.type
info:eu-repo/semantics/publishedVersion  
dc.date.updated
2025-05-26T09:32:08Z  
dc.identifier.eissn
2475-1847  
dc.journal.volume
9  
dc.journal.number
2  
dc.journal.pagination
173-189  
dc.journal.pais
Reino Unido  
dc.description.fil
Fil: Martínez Guevara, Layla M.. Universidad de Mendoza; Argentina  
dc.description.fil
Fil: Vidal, Pablo Javier. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina  
dc.description.fil
Fil: Olivera, Ana Carolina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina  
dc.description.fil
Fil: Millán, Emmanuel Nicolás. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina  
dc.journal.title
Journal of Information and Telecommunication  
dc.relation.alternativeid
info:eu-repo/semantics/altIdentifier/url/https://www.tandfonline.com/doi/full/10.1080/24751839.2024.2411884  
dc.relation.alternativeid
info:eu-repo/semantics/altIdentifier/doi/http://dx.doi.org/10.1080/24751839.2024.2411884