A neutrosophic theory based security approach for fog and mobile-edge computing‎

Faculty Computer Science Year: 2019
Type of Publication: ZU Hosted Pages:
Authors:
Journal: Computer Networks ELSEVIER Volume:
Keywords : , neutrosophic theory based security approach , , , mobile-edge    
Abstract:
Despite the many services and virtually infinite resources offered by cloud computing such as virtual reality and intelligent building surveillance, it still faces many problems when intervening several smart objects and devices in human's life. These problems are low latency, mobility and location awareness. For solving these problems of cloud computing, the fog and mobile edge computing have been introduced. The fog and mobile edge computing (FMEC) make services and resources close to users via moving from cloud data centers to the edge of the network. The dependability of FMEC depends on supplying centric services to users. The FMEC considered as a perfect paradigm to the above-mentioned purpose due to their ability to implement the ponderous real time applications directly at the network edge via billions of linked mobile devices. The FMEC faces some challenges as in any novel technology. These challenges are security (network security, data security, privacy of usage, data storage security, etc.) and administrative policies concerns. The critical problem which prohibit the development of FMEC is how to address dynamic varying of security services with the requirements of mobile's users. For handling this problem, we sought to provide a method for selecting the proper security service which is a multi-criteria decision making (MCDM) problem. In this research, we provide a neutrosophic PROMETHEE (preference ranking organization method for enrichment evaluation) technique for multi-criteria decision making problems to describe fuzzy information efficiently. For assessing the proposed methodology we applied it to a real case study to select proper security service for FMEC in the presence of fuzzy information.
   
     
 
       

Author Related Publications

  • Mohammed Abdel Basset Metwally Attia, "Discrete greedy flower pollination algorithm for spherical traveling salesman problem", Springer, 2019 More
  • Mohammed Abdel Basset Metwally Attia, "A New Hybrid Flower Pollination Algorithm for Solving Constrained Global Optimization Problems", Natural Sciences Publishing Cor., 2014 More
  • Mohammed Abdel Basset Metwally Attia, "A novel equilibrium optimization algorithm for multi-thresholding image segmentation problems", Springer London, 2021 More
  • Mohammed Abdel Basset Metwally Attia, "An efficient binary slime mould algorithm integrated with a novel attacking-feeding strategy for feature selection", Pergamon, 2021 More
  • Mohammed Abdel Basset Metwally Attia, "An efficient teaching-learning-based optimization algorithm for parameters identification of photovoltaic models: Analysis and validations", Pergamon, 2021 More

Department Related Publications

  • Saber Mohamed, "A surrogate-assisted differential evolution algorithm with dynamic parameters selection for solving expensive optimization problems", IEEE, 2014 More
  • Saber Mohamed, "Differential Evolution Combined with Constraint Consensus for Constrained Optimization", IEEE, 2011 More
  • mahmoud mohamed ismail ali, "AN EFFICIENT Hybrid Swarm Intelligence Technique for Solving Integer Programming", International Journal of Computers & Technology, 2013 More
  • mahmoud mohamed ismail ali, "A Hybrid Swarm Intelligence Technique for Solving Integer Multi-objective Problems", international journal of computer applications, 2014 More
  • mahmoud mohamed ismail ali, "An Improved Chaotic Flower Pollination Algorithm for Solving Large Integer Programming Problems", International Journal of Digital Content Technology and its Applications, 2014 More
Tweet