Fog computing extends cloud computing by providing resources on the edges of a network. It offers a decentralized computing structure that lies between the cloud and data-generating devices. Fog computing is emerged as the remarkable technology that aims at providing various services in the form of resources like servers, databases, storage, networking, and intelligence-over the Internet (“the cloud”) to customers. The demand for these services has drastically increased over the years due to flexibility and cost-effectiveness. As the demand increases for services, there is also the possibility of an increase in the threats. Security is critical in solving the challenges posed by these threats. In this paper, an attempt has been made to analyze the available security mechanisms to ensure security in the cloud and the fog environment such as decoy, advanced encryption standard, emoticons, blockchain-based security, attribute-based encryption, and identity-based encryption.
CITATION STYLE
Navya, S., & Sumathi, R. (2022). Performance Comparison of Data Security Strategies in Fog Computing. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 116, pp. 747–761). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-16-9605-3_51
Mendeley helps you to discover research relevant for your work.