Abstract
The rapid development of data generation and demand for real-time processing and analysis in the Internet of Things (IoT) has led to the emergence of new issues. In response, an extension of cloud computing, known as fog computing, aims to overcome these problems. It aims to bring computation, storage, and network services closer to the end-user by using a distributed computing infrastructure. With the ever-increasing need for secure communication in the digital age, the importance of encryption algorithms cannot be overstated. This study provides an analysis of two commonly used encryption techniques, Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA), with a specific focus on cloud/fog computing. The research compares the key size and security level of the ECC and RSA algorithms and evaluates their suitability for usage in resource-constrained fog computing environments. ECC, a newer technique, offers the same level of security as RSA but uses smaller key sizes, making it more resource-efficient. The research highlights that the choice of encryption technique for cloud/fog computing depends on the system’s specific requirements. The study concludes that ECC could be recommended for improved security and faster performance without putting unnecessary strain on the computing resources. RSA, on the other hand, has been widely accepted and proven its security over the years. The comparison shows that the choice of encryption algorithm for cloud/fog computing depends on the specific requirements of the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Paharia B, Bhushan K (2018) Fog computing as a defensive approach against distributed denial of service (ddos): a proposed architecture. In: 2018 9th International conference on computing, communication and networking technologies (ICCCNT) (2018).
Sittón-Candanedo I, Alonso RS, RodrÃguez-González S, GarcÃa Coria JA, De La Prieta F (2020) Edge computing architectures in industry 4.0: a general survey and comparison springer international publishing
DÃaz M, MartÃn C, Rubio B (2016) State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing. J Netw Comput Appl 67:99–117
Shu Z, Wan J, Zhang D, Li D (2016) Cloud-integrated cyber-physical systems for complex industrial applications. Mob Netw Appl 21(5):865–878
Chen Y, Sun E, Zhang Y (2017) Joint optimization of transmission and processing delay in fog computing access networks. In: 2017 9th international conference on advanced infocomm technology (ICAIT)
Sarkar S (2016) Theoretical modelling of fog computing: a green computing paradigm to support IoT applications. IET Netw 5(6):23–29
Sari A (2018) Context-aware intelligent systems for fog computing environments for cyber-threat intelligence. In: Fog computing. Springer International Publishing
Khakimov A, Muthanna A, Muthanna MSA (2018) Study of fog computing structure. In: NW Russia young researchers in electrical and electronic engineering conference (EIConRusNW). IEEE
Pan J, McElhannon J (2018) Future edge cloud and edge computing for Internet of things applications. IEEE Int Things J 5:439–449
Lin C, Yang J (2018) Cost-efficient deployment of fog computing systems at logistics centers in industry 4.0. IEEE Trans Ind Inform 14:4603–4611
Grover J, Jain A, Singhal S, Yadav A (2018) Real-time vanet applications using fog computing. In: Proceedings of first international conference on smart system, innovations and computing. Singapore
Shukla S, Hassan MF, Jung LT, Awang A (2019) Architecture for latency reduction in healthcare iot. Springer International Publishing
Manju AB, Sumathy S (2019) Efficient load balancing algorithm for task preprocessing in fog computing environment. In: Smart intelligent computing and applications, pp 291–298
Vasa J et al (2023) Architecture, applications and data analytics tools for smart cities: a technical perspective. In: Sentiment analysis and deep learning: proceedings of ICSADL 2022. Springer Nature Singapore, Singapore, pp 859–873
Mohamed N, Al-Jaroodi J, Jawhar I, Noura H, Mahmoud S (2017) Uavfog: a uav-based fog computing for internet of things. In: 2017 IEEE SmartWorld, ubiquitous intelligence & computing, advanced & trusted computed, scalable computing & communications, cloud & big data computing, internet of people and smart city innovation (smartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)
Ashrafi TH, Hossain MA, Arefin SE, Das KDJ, Chakrabarty A (2017) Iot infrastructure: fog computing surpasses cloud computing. In: Hu Y-C, Tiwari S, Mishra KK, Trivedi MC (eds) Intelligent communication and computational technologies, chapter: internet of things. Springer, Singapore
Campeanu G (2018) A mapping study on microservice architectures of Internet of things and cloud computing solutions. In: 2018 7th Mediterranean conference on embedded computing (MECO)
Chovatiya F et al (2018) A research direction on data mining with IoT. In: Inform Commun Technol Intell Syst (ICTIS 2017) 1:183–190
Gyandev Prajapati A, Jayantilal Sharma S, Sahebrao Badgujar V (2018) All about cloud: a systematic survey. In: 2018 international conference on smart city and emerging technology (ICSCET)
Rui J, Danpeng S (2016) Architecture design of the Internet of things based on cloud computing. In: 2015 seventh international conference on measuring technology and mechatronics automation
Pan J, Wang J, Hester A, Alqerm I, Liu Y, Zhao Y (2018) EdgeChain: an edge-IoT framework and prototype based on blockchain and smart contracts. IEEE Internet of Things J 6(3):4719–4732
Kumar S (2006) Elliptic curve cryptography for constrained devices. Dissertation, Rurh-University Bochum
Wang Y, Streff K, Raman S (2012) Smartphone security challenges. Computer 45(12):52–58
Rivest RL, Shamir A, Adelman L (1978) A method for obtaining digital signature and public-key cryptosystems. Commun ACM 21:120–126
Mansour A, Davis A, Wagner M, Bassous R, Fu H, Zhu Y (2017) Multi-asymmetric cryptographic RSA scheme. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (pp. 1–8)
Hong J-H (2000) RSA public key crypto-processor core design and hierarchical system test using IEEE 1149 family. Ph.D. dissertation, Dept. Elect. Eng., National Tsing Hua Univ., Hsinchu, Taiwan R.O.C
Nimbhorkar SU, Malik LG (2012) A survey on elliptic curve cryptography (ECC). Int J Adv Stud Comput Sci Eng 1(1):1–5
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48:2003–2009
Miller V (1986) Use of elliptic curves in cryptography. Adv Cryptol CRYPTO ’85 LNCS 218(483)
Khoirom MS, Laiphrakpam DS, Themrichon T (2018) Cryptanalysis of multimedia encryption using elliptic curve cryptography. Optik
Li C, Zhang Y, Xie EY (2019) When an attacker meets a cipher-image in 2018: A year in review. J Inf Secur Appl 48:102361
Käsper E (2011) Fast elliptic curve cryptography in OpenSSL. In: Proceedings of the 2011 international conference on financial cryptography and data security, Gros Islet, St. Lucia, 28 February–4 March 2011. Springer, Berlin/Heidelberg, Germany
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patel, D., Patel, B., Vasa, J., Patel, M. (2023). A Comparison of the Key Size and Security Level of the ECC and RSA Algorithms with a Focus on Cloud/Fog Computing. In: Choudrie, J., Mahalle, P.N., Perumal, T., Joshi, A. (eds) ICT with Intelligent Applications. ICTIS 2023. Lecture Notes in Networks and Systems, vol 719. Springer, Singapore. https://doi.org/10.1007/978-981-99-3758-5_5
Download citation
DOI: https://doi.org/10.1007/978-981-99-3758-5_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3757-8
Online ISBN: 978-981-99-3758-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)