A Study on Cloud and Fog Computing Security Issues and Solutions
Journal Title: International Journal of Innovative Research in Advanced Engineering - Year 2017, Vol 0, Issue 0
Abstract
Cloud computing is the significant part of the data world. The security level in cloud is undefined. Fog computing is the new buzz word added to the technical world. And the term Fog was coined by CISCO. The need for Fog computing is security and gets the data more closely to the end-user. Fog Computing is not going to replace the Cloud computing, it will be acting as the intermediate layer for securing the data which is stored inside the cloud. The principal idea of this paper is to provide data safety measures to the Cloud storage through Fog Computing. Fog Computing will be playing the vital role for the future technology. The Internet of Things (IoT) will be using the Fog computing to implement the smart World concept. So, in the future we have to handle huge amount of data and we need to provide the security for the Data. This study gives the security solutions available for the different issues.
Authors and Affiliations
Archana Lisbon A, Kavitha R
A Triple Band Notched Reconfigurable Micro strip Fed UWB Applications Antenna
In this paper a compact ultra wide band (UWB) triple band notched reconfigurable micro strip antenna is proposed. The bands 2.6GHZ-3.11GHZ (WIMAX) and 5.0GHZ-5.6GHZ (WIFI) and 7.4-8.6(C BAND) are notched from the antenna...
GIS-3D Analysis of Susceptibility Landslide Disaster in Upstream Area of Jeneberang River Watershed, South Sulawesi, Indonesia
The assessment of landslide hazard and risk has become a topic of major interest for both geoscientists and engineering professionals as well as for local communities and administrations in many parts of the world. Recen...
Customer Needs Analysis as Product Design Base of Refilled Bottled Water for Adults using Kano Models
Drinking water is a basic need for human beings. The higher level of awareness, activities, and mobility of people, the more people who consuming water. However, most people today prefer to buy water packaged in disposab...
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
Data security is now a crucial issue now in our day to day life. The protection of personal identity, personal finances depend on the protection of important and irreplaceable information. Cryptography is the science of...
Computational Approaches for Monitoring Voltage Stability in Power Networks
Voltage collapse and major blackouts have been repeatedly encountered in large power networks. The prime reason for this, is failure of systems ability to maintain synchronization. Under such condition system fails to ma...