Decoy technique for preserving the privacy in fog computing

3Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Fog computing is a process which computes and stores the data, which facilities network services between computing information centers and end devices. Fog computing is additionally fogging or edge computing. Fog computing focuses on increasing the efficiency and to quicken the data computing to cloud for storage and processing. This paper is mainly focus on securing personal information within the cloud employing a fog computing facility and decoy techniques. In the proposed system primary stage each licensed and unauthorized user can refer to the decoy information in fog computing. Using user profiling technique, the authorized user will be identified. If it’s an unauthorized user, they cannot access the original data. If it is an authorized user, then it proceeds to the second stage by verifying the challenges. The challenge can be secured with verification code or else it can be a private question. Once authorized users clear the security challenge, they can access the original data.

Cite

CITATION STYLE

APA

Bindu Madavi, K. P., & Vijayakarthick, P. (2021). Decoy technique for preserving the privacy in fog computing. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 53, pp. 89–94). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-5258-8_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free