REQUIREMENT OF SECURITY FOR FOG BASED CLOUD ENVIRONMENT: A REVIEW
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.8, No. 5)Publication Date: 2019-05-30
Authors : Manesh; Renu Malik;
Page : 56-59
Keywords : Cloud Computing; Fog Computing; Port no.; Session layer security; Application layer; Cryptography;
Abstract
The requirement of security in fog based cloud system has been discussed here. There are several researches in the field of fog computing which have been mentioned in this paper. Fog computing the fog networking. It is a decentralized computing system. In this system the data, compute, storage and applications are distributed in the most logical, efficient place. The main objective of fogging is to improve efficiency of cloud. It reduces amount of data transmitted to cloud for processing, analysis & storage. The middle fog layer is consisting servers. These have been installed at edge of IP networks. It is supported by limited data storage, computer and wireless communication tools.. To ensure the data protection by splitting and encrypting data using advanced cryptographic mechanism. This paper is describing the method to reduce the probability of packet dropping and congestion. It designs and implements more secure algorithm to protect data from active and passive type of attack at application layer. It also makes comparative analysis of proposed model with existing security model.
Other Latest Articles
- A Review Paper on Analysis of Security Techniques of VANET
- Investigation of ANN Used to Solve MLR Problem
- Weepies Going Dirty and Machos Doing Masti: Unveiling the Female Chauvinist Pigs in Indian Cinema
- Social Media's Black Magic: The Dynamics of American Politics
- Ferguson: Returning to Popular Sovereignty through Rhetorical Protest
Last modified: 2019-05-18 17:33:44