Performance Comparison of Data Security Strategies in Fog Computing

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Fog computing extends cloud computing by providing resources on the edges of a network. It offers a decentralized computing structure that lies between the cloud and data-generating devices. Fog computing is emerged as the remarkable technology that aims at providing various services in the form of resources like servers, databases, storage, networking, and intelligence-over the Internet (“the cloud”) to customers. The demand for these services has drastically increased over the years due to flexibility and cost-effectiveness. As the demand increases for services, there is also the possibility of an increase in the threats. Security is critical in solving the challenges posed by these threats. In this paper, an attempt has been made to analyze the available security mechanisms to ensure security in the cloud and the fog environment such as decoy, advanced encryption standard, emoticons, blockchain-based security, attribute-based encryption, and identity-based encryption.

Cite

CITATION STYLE

APA

Navya, S., & Sumathi, R. (2022). Performance Comparison of Data Security Strategies in Fog Computing. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 116, pp. 747–761). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-16-9605-3_51

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free