Different Approach to Secure Data with Fog Computing

Main Article Content

Dr. Vishal Kumar Goar

Abstract

Fog computing could be a paradigm that extends cloud computing that has become a reality that made-up the method for brand new model of computing. additionally, fog provides application services to finish terminal within the age of network. The inner information stealing attacks in that a user of a system illegitimately poses because the identity of associate other legitimate user which is an arising new challenge to the service supplier wherever cloud service supplier might not be able to defend the information. therefore, to secure the important user�s sensitive data type the offender within the cloud. In this research paper I am proposing a very distinct approach with the assistance of offensive decoy data technology, that is employed for confirming whether or not the data access is permitted wherever abnormal information is detected andthereby confusing the offender with the fake data.

Article Details

How to Cite
, D. V. K. G. (2018). Different Approach to Secure Data with Fog Computing. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 4(3), 595–597. Retrieved from http://www.ijfrcsce.org/index.php/ijfrcsce/article/view/1368
Section
Articles