2022
DOI: 10.1155/2022/3426811
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Transmission Using Quantum Cryptography in Fog Computing

Abstract: Fog computing’s idea is to bring virtual existence into objects used on a daily basis. The “objects” layer of fog architecture is also known as the smart object layer (SOL). SOL has provided the fog network with a strong platform to outperform. Although the fog architecture decentralizes data, uses more data centers, and collects and transmits it to adjacent servers for faster processing in fog networks, it faces several security challenges. The security problems of fog computing need to be alleviated for the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…They adapted LRFEs by including FE for regular languages in addition to the Attribute-Based Encryption (ABE) for large world, and ABE with short cipher text. However, in [15], C. Mangla et al proposed an approach to secure data transmission in fog computing using quantum cryptography which is a way used to provide a new computation method over classical computing. Indeed, quantum mechanics laws provide the power to quantum computing over the classical systems.…”
Section: Related Workmentioning
confidence: 99%
“…They adapted LRFEs by including FE for regular languages in addition to the Attribute-Based Encryption (ABE) for large world, and ABE with short cipher text. However, in [15], C. Mangla et al proposed an approach to secure data transmission in fog computing using quantum cryptography which is a way used to provide a new computation method over classical computing. Indeed, quantum mechanics laws provide the power to quantum computing over the classical systems.…”
Section: Related Workmentioning
confidence: 99%
“…The usage of cloud computing raises a number of security concerns, including data confidentiality and privacy [10,11], and 12]. The use of cryptographic algorithms has shown to be a viable and effective technique of ensuring the secrecy and privacy of cloud data [13][14][15][16], and [17]. The employment of cryptographic methods helps to maintain the secrecy and privacy of cloud data, much like with Enhanced RSA (ERSA) [18], Non-Deterministic Cryptographic Scheme (NCS) [19], and Enhanced Homomorphism scheme [20].…”
Section: Introductionmentioning
confidence: 99%
“…The adoption of cloud computing is accompanied by a number of security issues, such as data privacy and confidentiality [ 10 – 12 ]. In order to guarantee the secrecy and privacy of cloud data, cryptographic techniques have shown to be an effective and efficient methods [ 12 16 , 18 ].…”
Section: 0 Introductionmentioning
confidence: 99%