Abstract
Edge or fog computing are being used to reduce latency between end devices and traditional cloud computing. The latest developments that have improved the hardware aspects of wireless sensors and mobile networks, gave the opportunity for other enhancements if such technologies are integrated between them. Regarding this enhanced heterogeneous environment, the approach of placing services needs to reconsider the security aspects. We have developed a baseline method of a solution which fulfills the cybersecurity requirements converging with the proposed multi-tier integrated model, that enhances the K-means algorithm with added processing steps supplying the criteria of the CIA triad.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Interactive Mobile Technologies (iJIM)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.