CFP last date
20 January 2025
Reseach Article

Survey on Security Performance of Fog Computing and Existing Encryption Techniques

by Sakshi Tripathi, Rakesh Kumar Tiwari, Rajesh Nigam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 35
Year of Publication: 2020
Authors: Sakshi Tripathi, Rakesh Kumar Tiwari, Rajesh Nigam
10.5120/ijca2020920433

Sakshi Tripathi, Rakesh Kumar Tiwari, Rajesh Nigam . Survey on Security Performance of Fog Computing and Existing Encryption Techniques. International Journal of Computer Applications. 176, 35 ( Jul 2020), 27-33. DOI=10.5120/ijca2020920433

@article{ 10.5120/ijca2020920433,
author = { Sakshi Tripathi, Rakesh Kumar Tiwari, Rajesh Nigam },
title = { Survey on Security Performance of Fog Computing and Existing Encryption Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2020 },
volume = { 176 },
number = { 35 },
month = { Jul },
year = { 2020 },
issn = { 0975-8887 },
pages = { 27-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number35/31427-2020920433/ },
doi = { 10.5120/ijca2020920433 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:44:15.470445+05:30
%A Sakshi Tripathi
%A Rakesh Kumar Tiwari
%A Rajesh Nigam
%T Survey on Security Performance of Fog Computing and Existing Encryption Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 35
%P 27-33
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Fog computing is a standard partition infrastructure between edge and cloud computing. Fog computing and cloud computing are not the same they both have the features that make them different from each other but both have some uniform character because of this, here did not devote security and privacy assessment of cloud to fog computing like mobility, heterogeneity, etc. Fog computing is present as an intermediate layer work as an arm between cloud and edge computing. As the data increases, the security problems will be over. The essential problem in fog computing is its security because of finite resources. Cloud computing is technology here, any amount of data is stored online on a cloud server but cloud computing or servers of the cloud is miles from the end-user and this is the reason user faces a problem like lower latency so to deal with a problem a new technology called Fog computing is designed. In this survey, discussing the security concern of fog computing and will try to find the solution better than the existing solution as well.

References
  1. Kunal S, Saha A, Amin R. An overview of cloud-fog computing: Architectures, Applications with security challenges. Security and Privacy. 2019;2:e72.
  2. Akhilesh Vishwanath, Ramya Peruri, Jing (Selena) He,” Security in fog computing through Encryption”, International Journal of Information Technology and Computer Science(IJITCS), Vol.8, No.5, pp.28-36, 2016 DOI: 10.5815/ijitcs.2016.05.03
  3. Deepak Puthal, Fog computing security challenges, and future directions, ResearchGate, May 2019.
  4. Abebe Abeshu Diro, Naveen Chilamkurti, Yunyoung Nam. Analysis of Lightweight Encryption Scheme for-to-things Communication. Asan 31638, South Korea. IEEE,2018.
  5. Ionita M-G, Patriciu V-V. S secure threat information exchange across the internet of things for cyber defense in a fog computing environment. Inf Econ. 2016;20(3): 16-27.
  6. A. Dior, N. Chilamkurti, and N, Kumar, “Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog-computing”, Mobile Netw. Appl., vol. 22, no. 5, pp.848-858, 2017.
  7. Yung Guan, Jun Shao, Gui Yi Wei, Mande Xie, Data Security, and privacy in fog computing IEEE.
  8. Yang R, Xu Q, Au MH, Yu Z, Wang H, Zhou L. Position-based cryptography with location privacy: a step for fog computing. Futur Gener Comput Syst. 2018; 78:799-806.
  9. I. Stojmenovic, “Fog computing: A cloud to the ground support for smart things and machine-to-machine networks,” in Proc. IEEE Austral. Telecom. Netw. Appl. Conf. (ATNAC), Nov. 2014, pp. 117-122.
  10. Shikha Mathur, Vishal Goar, Deepika Gupta, Manoj Kuri, Analysis and design of enhanced RSA algorithm to improve security, IEEE 3rd International conference on “Computational Intelligence and communication technology” IEEE-CICT 2017
  11. A. A. Dior, H. T. Reda. And N. Chilamkurti, “Differential flow space allocation scheme in SDN based fog computing for IoT applications,” j. Ambient Intell. Humanized Comput., pp. 1-11, Jan. 2018.
  12. C. Dsouza, G. J. Ahn, and M. Taguinod, “Policy-driven security management for fog computing: preliminary framework and a case study,” in Proc. IEEE 15th Int. Conf. Int. Reuse Integer. (IEEE IRI), Aug. 2014, pp. 16-23
  13. M. Green and G. Ateniese, “Identity-based proxy re-encryption”, in Applied Cryptography and Network security. Berlin, Germany: Springer, 2007.
  14. Mohammed, E.M, Ambelkadar, H.s, “Enhanced Data Security Model on Cloud Computing”, International Conferences on IEEE publication 2012, on pages(s): cc-12-cc-17.
  15. D. Hankerson. S. Vanstone, and A. J. Menezes, Guide to Elliptic Curve Cryptography. New York. NY, USA: Springer-Verlag, 2004.
  16. Neha Shrikant Dhande, FOG COMPUTING: REVIEW OF PRIVACY AND SECURITY ISSUES, International Journal of Engineering Research and General Science Volume 3, Issue 2, March-April, 2015
  17. Naranjo PGV et al. P-SEP: a prolonged stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks J Supercomput. 2017;73(2):733-755.
  18. Peter N. Fog computing and its real-time applications. Int J Emerg Technol Adv Eng. 2015;5(6):266-269.
  19. Monteiro, Admir, et al. “Fit: a fog computing device for speech data-treatments.” 2016 IEEE International Conference on Smart Computing (SMARTCOMP). St. Louis, MO: IEEE, 2016.
  20. Chiang, Mung, and Tao Zhang. “Fog and IoT: an overview of research opportunities.” IEEE Internet Things J 3 (6) (2016): 854-864.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Privacy issues Security obstacle Fog computing Fog server and Proxy server.