Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

An efficient fog computing for comprising approach to avoid data theft attack

View through CrossRef
Cloud computing has become a new paradigm shift in the IT world because of its revolutionary model of computing. It provides flexibility, scalability, and reliability and decreased operational and support expenses for an organization. The Enterprise edition software’s are very costly and maintaining a separate IT team and maintaining their own servers is very expensive and that’s the reason why most of the companies are opting for Cloud computing over enterprise edition of the software. However, few organization cloud customers are not willing to step to cloud computing up on a big scale because of the safety problems present in cloud computing. One more disadvantage of Cloud is it’s not suitable for another revolutionary technology i.e.IoT(Internet of things)In this paper we are going to present the Advantages of Fog Computing and Decoy technology to address the security in cloud computing by extending it into fog computing.Fog Computing is a new paradigm in which the computing power moves to the edge of the network. So, it’s also called as Edge Computing.
Title: An efficient fog computing for comprising approach to avoid data theft attack
Description:
Cloud computing has become a new paradigm shift in the IT world because of its revolutionary model of computing.
It provides flexibility, scalability, and reliability and decreased operational and support expenses for an organization.
The Enterprise edition software’s are very costly and maintaining a separate IT team and maintaining their own servers is very expensive and that’s the reason why most of the companies are opting for Cloud computing over enterprise edition of the software.
However, few organization cloud customers are not willing to step to cloud computing up on a big scale because of the safety problems present in cloud computing.
One more disadvantage of Cloud is it’s not suitable for another revolutionary technology i.
e.
IoT(Internet of things)In this paper we are going to present the Advantages of Fog Computing and Decoy technology to address the security in cloud computing by extending it into fog computing.
Fog Computing is a new paradigm in which the computing power moves to the edge of the network.
So, it’s also called as Edge Computing.

Related Results

Dense Fog Burst Reinforcement over Eastern China
Dense Fog Burst Reinforcement over Eastern China
<p>Fog can be hazardous weather. Dense and polluted fog is especially known to impact transportation, air quality, and public health. Low visibilities on fog days thr...
Fog dissipation through ground warming monitored by satellite image : an approach to support regional forecasting 
Fog dissipation through ground warming monitored by satellite image : an approach to support regional forecasting 
<p>By reducing the atmospheric visibility, fog events have strong impacts on several humans activities. Transport security, military operations, air quality forecast ...
Fog in Sofia 2010–2019: Objective Circulation Classification and Fog Indices
Fog in Sofia 2010–2019: Objective Circulation Classification and Fog Indices
Low visibility caused by fog events can lead to disruption of every type of public transportation, and even loss of life. The focus of this study is the synoptic conditions associa...
Fog climatology at Shanghai Pudong International Airport
Fog climatology at Shanghai Pudong International Airport
AbstractUsing 22‐year ground observations on meteorological variables, we conducted a statistical analysis to reveal fog characteristics at Shanghai Pudong International Airport (S...
Load Balancing at Fog Nodes using Scheduling Algorithms
Load Balancing at Fog Nodes using Scheduling Algorithms
Cloud Computing proves to be most predominant innovative field in the area of Information technology. Cloud is best suited for small scale to large scale businesses and personal pu...
Edge/Fog Computing Networks
Edge/Fog Computing Networks
AbstractAs a main driver of 5G, the future mobile network is going to create a hyper‐connected Internet of Everything (IoE) world which requires the network to be scalable, versati...
A novel trust model for fog computing using fuzzy neural networks and weighted weakest link
A novel trust model for fog computing using fuzzy neural networks and weighted weakest link
PurposeTrust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing (FC) has emerged as mitigation of several cloud comp...
Influence of nighttime radiation fog on the development of the daily boundary layer: An large eddy simulation study
Influence of nighttime radiation fog on the development of the daily boundary layer: An large eddy simulation study
<p>Apart from hazards associated with deep fog, its presence significantly alters the properties of the nocturnal boundary layer (NBL). <br&gt...

Back to Top