A neutrosophic theory based security approach for fog and mobile-edge computing‎

Faculty Computer Science Year: 2019
Type of Publication: ZU Hosted Pages:
Authors:
Journal: Computer Networks ELSEVIER Volume:
Keywords : , neutrosophic theory based security approach , , , mobile-edge    
Abstract:
Despite the many services and virtually infinite resources offered by cloud computing such as virtual reality and intelligent building surveillance, it still faces many problems when intervening several smart objects and devices in human's life. These problems are low latency, mobility and location awareness. For solving these problems of cloud computing, the fog and mobile edge computing have been introduced. The fog and mobile edge computing (FMEC) make services and resources close to users via moving from cloud data centers to the edge of the network. The dependability of FMEC depends on supplying centric services to users. The FMEC considered as a perfect paradigm to the above-mentioned purpose due to their ability to implement the ponderous real time applications directly at the network edge via billions of linked mobile devices. The FMEC faces some challenges as in any novel technology. These challenges are security (network security, data security, privacy of usage, data storage security, etc.) and administrative policies concerns. The critical problem which prohibit the development of FMEC is how to address dynamic varying of security services with the requirements of mobile's users. For handling this problem, we sought to provide a method for selecting the proper security service which is a multi-criteria decision making (MCDM) problem. In this research, we provide a neutrosophic PROMETHEE (preference ranking organization method for enrichment evaluation) technique for multi-criteria decision making problems to describe fuzzy information efficiently. For assessing the proposed methodology we applied it to a real case study to select proper security service for FMEC in the presence of fuzzy information.
   
     
 
       

Author Related Publications

  • Mohammed Abdel Basset Metwally Attia, "Discrete greedy flower pollination algorithm for spherical traveling salesman problem", Springer, 2019 More
  • Mohammed Abdel Basset Metwally Attia, "A New Hybrid Flower Pollination Algorithm for Solving Constrained Global Optimization Problems", Natural Sciences Publishing Cor., 2014 More
  • Mohammed Abdel Basset Metwally Attia, "A novel equilibrium optimization algorithm for multi-thresholding image segmentation problems", Springer London, 2021 More
  • Mohammed Abdel Basset Metwally Attia, "An efficient binary slime mould algorithm integrated with a novel attacking-feeding strategy for feature selection", Pergamon, 2021 More
  • Mohammed Abdel Basset Metwally Attia, "An efficient teaching-learning-based optimization algorithm for parameters identification of photovoltaic models: Analysis and validations", Pergamon, 2021 More

Department Related Publications

  • Mohammed Abdel Basset Metwally Attia, "Discrete greedy flower pollination algorithm for spherical traveling salesman problem", Springer, 2019 More
  • Mohammed Abdel Basset Metwally Attia, "A New Hybrid Flower Pollination Algorithm for Solving Constrained Global Optimization Problems", Natural Sciences Publishing Cor., 2014 More
  • Saber Mohamed, "Training and Testing a Self-Adaptive Multi-Operator Evolutionary Algorithm for Constrained Optimization", ELSEVEIR, 2015 More
  • Saber Mohamed, "An Improved Self-Adaptive Differential Evolution Algorithm for Optimization Problems", IEEE, 2013 More
  • Saber Mohamed, "Differential Evolution with Dynamic Parameters Selection for Optimization Problems", IEEE, 2014 More
Tweet