A Study on Cloud and Fog Computing Security Issues and Solutions
Journal Title: International Journal of Innovative Research in Advanced Engineering - Year 2017, Vol 0, Issue 0
Abstract
Cloud computing is the significant part of the data world. The security level in cloud is undefined. Fog computing is the new buzz word added to the technical world. And the term Fog was coined by CISCO. The need for Fog computing is security and gets the data more closely to the end-user. Fog Computing is not going to replace the Cloud computing, it will be acting as the intermediate layer for securing the data which is stored inside the cloud. The principal idea of this paper is to provide data safety measures to the Cloud storage through Fog Computing. Fog Computing will be playing the vital role for the future technology. The Internet of Things (IoT) will be using the Fog computing to implement the smart World concept. So, in the future we have to handle huge amount of data and we need to provide the security for the Data. This study gives the security solutions available for the different issues.
Authors and Affiliations
Archana Lisbon A, Kavitha R
STUDY ON GEOPOLYMER CONCRETE USED FOR PAVING BLOCKS
Paver block is used in various applications like in street road and other construction places. Portland cement generates large amounts of carbon dioxide (CO2) which is responsible for global warming hence it is a greenho...
Modern LED Street Lighting System with Intensity Control Based on Vehicle Movements and Atmospheric Conditions Using WSN
Street lighting accounts for 53% of outdoor lighting use, and the market is continuously increasing. In the context of rising energy prices and growing environmental awareness, energy efficiency is becoming one of the mo...
DESIGN OF UNDERGROUND OPERATIONS COMPLEX FOR BLAST LOADS
Underground structures are an integral part of the infrastructure of modern society and are used for a wide range of applications, including subways and railways, highways, material storage, sewage and water transport. U...
Point Sum Average Peak Algorithm Detection of LTE Preamble
This paper proposes an improved detection algorithm for LTE Random Access preamble detection and evaluates the performance of the algorithm with respect to the performance of algorithms proposed in the literature using M...
The Assessments and Challenges of LED Generated Data Traffic using Li-Fi Technology
Internet today will be highly integrated with many aspects of our daily needs making it a corner stone in modern life. This dependency increased the demand on having internet services with higher Bandwidth, higher Bit Ra...