International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 176 - Number 35 |
Year of Publication: 2020 |
Authors: Sakshi Tripathi, Rakesh Kumar Tiwari, Rajesh Nigam |
10.5120/ijca2020920433 |
Sakshi Tripathi, Rakesh Kumar Tiwari, Rajesh Nigam . Survey on Security Performance of Fog Computing and Existing Encryption Techniques. International Journal of Computer Applications. 176, 35 ( Jul 2020), 27-33. DOI=10.5120/ijca2020920433
Fog computing is a standard partition infrastructure between edge and cloud computing. Fog computing and cloud computing are not the same they both have the features that make them different from each other but both have some uniform character because of this, here did not devote security and privacy assessment of cloud to fog computing like mobility, heterogeneity, etc. Fog computing is present as an intermediate layer work as an arm between cloud and edge computing. As the data increases, the security problems will be over. The essential problem in fog computing is its security because of finite resources. Cloud computing is technology here, any amount of data is stored online on a cloud server but cloud computing or servers of the cloud is miles from the end-user and this is the reason user faces a problem like lower latency so to deal with a problem a new technology called Fog computing is designed. In this survey, discussing the security concern of fog computing and will try to find the solution better than the existing solution as well.