Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture

Due to the Internet of Things (IoT) widespread adoption, data traffic to cloud servers for analysis has surged, impacting IoT system latency. Fog Computing emerged as a solution, bringing processing capabilities closer to data generation points, reducing data sent to the cloud, and improving respons...

Full description

Saved in:
Bibliographic Details
Main Authors: Layla M. Martínez Guevara, Pablo Javier Vidal, Ana Carolina Olivera, Emmanuel N. Millán
Format: Article
Language:English
Published: Taylor & Francis Group 2025-04-01
Series:Journal of Information and Telecommunication
Subjects:
Online Access:https://www.tandfonline.com/doi/10.1080/24751839.2024.2411884
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Due to the Internet of Things (IoT) widespread adoption, data traffic to cloud servers for analysis has surged, impacting IoT system latency. Fog Computing emerged as a solution, bringing processing capabilities closer to data generation points, reducing data sent to the cloud, and improving response times. However, it intensifies security concerns due to the proximity of sensitive data to users and limited node computational resources. This research aims to study encryption and data verification algorithms using various datasets and the cryptography software OpenSSL. Testing is performed on Raspberry Pi hardware, facilitating the implementation of Fog nodes. Metrics such as CPU, memory, and energy consumption are evaluated using scripts. Results show that data type does not influence algorithm choice, and patterns related to data size behaviour are identified, aiding in defining security strategies.
ISSN:2475-1839
2475-1847