ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.8, No. 5)

Publication Date:

Authors : ; ;

Page : 56-59

Keywords : Cloud Computing; Fog Computing; Port no.; Session layer security; Application layer; Cryptography;

Source : Downloadexternal Find it from : Google Scholarexternal


The requirement of security in fog based cloud system has been discussed here. There are several researches in the field of fog computing which have been mentioned in this paper. Fog computing the fog networking. It is a decentralized computing system. In this system the data, compute, storage and applications are distributed in the most logical, efficient place. The main objective of fogging is to improve efficiency of cloud. It reduces amount of data transmitted to cloud for processing, analysis & storage. The middle fog layer is consisting servers. These have been installed at edge of IP networks. It is supported by limited data storage, computer and wireless communication tools.. To ensure the data protection by splitting and encrypting data using advanced cryptographic mechanism. This paper is describing the method to reduce the probability of packet dropping and congestion. It designs and implements more secure algorithm to protect data from active and passive type of attack at application layer. It also makes comparative analysis of proposed model with existing security model.

Last modified: 2019-05-18 17:33:44