{"id":"https://openalex.org/W4404031322","doi":"https://doi.org/10.1109/icccnt61001.2024.10726045","title":"A Novel Blockchain-Based Encryption Model to Protect Fog Nodes","display_name":"A Novel Blockchain-Based Encryption Model to Protect Fog Nodes","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404031322","doi":"https://doi.org/10.1109/icccnt61001.2024.10726045"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10726045","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10726045","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050135410","display_name":"Ruchi Agrawal","orcid":"https://orcid.org/0000-0003-0168-6000"},"institutions":[{"id":"https://openalex.org/I82571370","display_name":"GLA University","ror":"https://ror.org/05fnxgv12","country_code":"IN","type":"education","lineage":["https://openalex.org/I82571370"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ruchi Agrawal","raw_affiliation_strings":["GLA University,Mathura"],"affiliations":[{"raw_affiliation_string":"GLA University,Mathura","institution_ids":["https://openalex.org/I82571370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035000500","display_name":"Saurabh Singhal","orcid":"https://orcid.org/0000-0002-3117-8085"},"institutions":[{"id":"https://openalex.org/I82571370","display_name":"GLA University","ror":"https://ror.org/05fnxgv12","country_code":"IN","type":"education","lineage":["https://openalex.org/I82571370"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Saurabh Singhal","raw_affiliation_strings":["GLA University,Mathura"],"affiliations":[{"raw_affiliation_string":"GLA University,Mathura","institution_ids":["https://openalex.org/I82571370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101709065","display_name":"Ashish Sharma","orcid":"https://orcid.org/0000-0002-3904-8648"},"institutions":[{"id":"https://openalex.org/I82571370","display_name":"GLA University","ror":"https://ror.org/05fnxgv12","country_code":"IN","type":"education","lineage":["https://openalex.org/I82571370"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashish Sharma","raw_affiliation_strings":["GLA University,Mathura"],"affiliations":[{"raw_affiliation_string":"GLA University,Mathura","institution_ids":["https://openalex.org/I82571370"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050135410"],"corresponding_institution_ids":["https://openalex.org/I82571370"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30643219,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9309999942779541,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9309999942779541,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8275976181030273},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6977872848510742},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5771111249923706},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5608072876930237},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3744674324989319}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8275976181030273},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6977872848510742},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5771111249923706},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5608072876930237},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3744674324989319}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10726045","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10726045","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","id":"https://metadata.un.org/sdg/13","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2760115789","https://openalex.org/W3086705457","https://openalex.org/W3131712154","https://openalex.org/W3215175049","https://openalex.org/W4213227084","https://openalex.org/W4289545043","https://openalex.org/W4295137429","https://openalex.org/W4297399612","https://openalex.org/W4310240502","https://openalex.org/W4311113065","https://openalex.org/W4312051207","https://openalex.org/W4312115628","https://openalex.org/W4313462074","https://openalex.org/W4313856434","https://openalex.org/W4320037183","https://openalex.org/W4327893913","https://openalex.org/W4376602736","https://openalex.org/W4381682635","https://openalex.org/W4384916364","https://openalex.org/W4385655188","https://openalex.org/W4388602839","https://openalex.org/W4389510369","https://openalex.org/W4390591076","https://openalex.org/W6774219318"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047"],"abstract_inverted_index":{"Utilizing":[0],"blockchain":[1,37,41,61,254],"along":[2,65,255],"with":[3,62,66,142,256],"fog":[4,63,157,258],"computing":[5,259],"to":[6,47,59,72,185,207,241,261,280],"improve":[7,73],"secure":[8,125,263],"data":[9,18,79,84,119,151,245,264],"access":[10,80,152,265],"control":[11,81,266],"mechanisms":[12,91,191,279],"within":[13,36],"the":[14,40,74,136,148,162,177,187,198,214,219,238,253,257,268],"realm":[15],"of":[16,55,78,135,150,167,173,179,189,195,213,223,234,246],"distributed":[17,83,156],"storage":[19,85,154],"and":[20,34,50,76,96,153,169,205,221,231,243,276],"authentication":[21],"poses":[22],"various":[23],"challenges.":[24],"One":[25],"such":[26],"hurdle":[27],"is":[28,58],"finding":[29],"a":[30,109,193,209],"balance":[31],"between":[32],"decentralization":[33],"scalability":[35],"technology.":[38],"As":[39],"ledger":[42],"grows,":[43],"it":[44],"may":[45],"lead":[46],"increased":[48],"latency":[49],"resource":[51],"requirements.":[52],"The":[53,133,226,250],"goal":[54],"this":[56],"research":[57],"combine":[60],"computing,":[64],"an":[67],"algorithm":[68],"for":[69,99,164,228,252],"hybrid":[70],"encryption,":[71],"security":[75,149],"efficiency":[77,117],"in":[82,118,155,267],"as":[86,88],"well":[87],"authentication.":[89],"Authentication":[90,94,98,103],"leverage":[92],"Multi-Factor":[93],"(MFA)":[95],"Token-Based":[97,102],"heightened":[100],"security.":[101],"employs":[104],"dynamic":[105],"codes":[106],"generated":[107],"by":[108],"physical":[110],"or":[111],"mobile":[112],"token.":[113],"Symmetric":[114],"encryption":[115,123,229],"ensures":[116],"transmission,":[120],"while":[121],"asymmetric":[122],"provides":[124],"key":[126],"exchange":[127],"Honey":[128],"Encryption-based":[129],"Hybrid":[130],"Cryptographic":[131],"Algorithm.":[132],"integration":[134],"Zero":[137,159],"Trust":[138,160],"Security":[139],"(ZTS)":[140],"Model":[141],"Secure":[143],"Multi-Party":[144],"Computation":[145],"(SMPC)":[146],"enhances":[147],"environments.":[158],"emphasizes":[161],"necessity":[163],"continuous":[165],"verification":[166],"user":[168],"device":[170],"trustworthiness,":[171],"irrespective":[172],"their":[174],"location,":[175],"reinforcing":[176],"principles":[178],"SMPC.":[180],"MATLAB":[181],"experiments":[182],"were":[183,203],"implemented":[184],"evaluate":[186],"efficacy":[188],"proposed":[190,215],"under":[192],"range":[194],"scenarios.":[196],"Leveraging":[197],"platform\u2019s":[199],"computational":[200],"capabilities,":[201],"simulations":[202],"conducted":[204],"analyzed":[206],"provide":[208],"comprehensive":[210],"performance":[211],"assessment":[212],"solutions,":[216],"thereby":[217],"informing":[218],"design":[220],"optimization":[222],"these":[224,235],"mechanisms.":[225],"findings":[227],"time":[230,233],"decryption":[232],"metrics":[236],"reflect":[237],"durations":[239],"needed":[240],"encode":[242],"decode":[244],"varying":[247],"sizes":[248],"securely.":[249],"potential":[251],"model":[260],"ensure":[262],"future":[269],"depends":[270],"on":[271],"further":[272],"developing":[273],"interoperability":[274],"standards":[275],"improving":[277],"consensus":[278],"increase":[281],"scalability.":[282]},"counts_by_year":[],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
