Mostrar el registro sencillo del ítem
dc.contributor.author
Martínez Guevara, Layla M.
dc.contributor.author
Vidal, Pablo Javier

dc.contributor.author
Olivera, Ana Carolina

dc.contributor.author
Millán, Emmanuel Nicolás

dc.date.available
2025-05-26T10:18:29Z
dc.date.issued
2024-10
dc.identifier.citation
Martínez Guevara, Layla M.; Vidal, Pablo Javier; Olivera, Ana Carolina; Millán, Emmanuel Nicolás; Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture; Taylor & Francis; Journal of Information and Telecommunication; 9; 2; 10-2024; 173-189
dc.identifier.issn
2475-1839
dc.identifier.uri
http://hdl.handle.net/11336/262532
dc.description.abstract
Due to the Internet of Things (IoT) widespread adoption, data traffic to cloud servers for analysis has surged, impacting IoT system latency. Fog Computing emerged as a solution, bringing processing capabilities closer to data generation points, reducing data sent to the cloud, and improving response times. However, it intensifies security concerns due to the proximity of sensitive data to users and limited node computational resources. This research aims to study encryption and data verification algorithms using various datasets and the cryptography software OpenSSL. Testing is performed on Raspberry Pi hardware, facilitating the implementation of Fog nodes. Metrics such as CPU, memory, and energy consumption are evaluated using scripts. Results show that data type does not influence algorithm choice, and patterns related to data size behaviour are identified, aiding in defining security strategies.
dc.format
application/pdf
dc.language.iso
eng
dc.publisher
Taylor & Francis

dc.rights
info:eu-repo/semantics/openAccess
dc.rights.uri
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
dc.subject
FOG COMPUTING
dc.subject
SECURITY
dc.subject
CRYPTOGRAPHY
dc.subject.classification
Ciencias de la Computación

dc.subject.classification
Ciencias de la Computación e Información

dc.subject.classification
CIENCIAS NATURALES Y EXACTAS

dc.title
Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture
dc.type
info:eu-repo/semantics/article
dc.type
info:ar-repo/semantics/artículo
dc.type
info:eu-repo/semantics/publishedVersion
dc.date.updated
2025-05-26T09:32:08Z
dc.identifier.eissn
2475-1847
dc.journal.volume
9
dc.journal.number
2
dc.journal.pagination
173-189
dc.journal.pais
Reino Unido

dc.description.fil
Fil: Martínez Guevara, Layla M.. Universidad de Mendoza; Argentina
dc.description.fil
Fil: Vidal, Pablo Javier. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina
dc.description.fil
Fil: Olivera, Ana Carolina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina
dc.description.fil
Fil: Millán, Emmanuel Nicolás. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto Interdisciplinario de Ciencias Básicas. - Universidad Nacional de Cuyo. Instituto Interdisciplinario de Ciencias Básicas; Argentina
dc.journal.title
Journal of Information and Telecommunication
dc.relation.alternativeid
info:eu-repo/semantics/altIdentifier/url/https://www.tandfonline.com/doi/full/10.1080/24751839.2024.2411884
dc.relation.alternativeid
info:eu-repo/semantics/altIdentifier/doi/http://dx.doi.org/10.1080/24751839.2024.2411884
Archivos asociados