
An efficient fog computing for comprising approach to avoid data theft attack
Author(s) -
T. Pavan Kumar,
B Eswar,
P Ayyappa Reddy,
Divya Bhargavi
Publication year - 2018
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i2.8.10556
Subject(s) - cloud computing , computer science , utility computing , computer security , cloud computing security , scalability , edge computing , flexibility (engineering) , server , trusted computing , distributed computing , software , operating system , statistics , mathematics
Cloud computing has become a new paradigm shift in the IT world because of its revolutionary model of computing. It provides flexibility, scalability, and reliability and decreased operational and support expenses for an organization. The Enterprise edition software’s are very costly and maintaining a separate IT team and maintaining their own servers is very expensive and that’s the reason why most of the companies are opting for Cloud computing over enterprise edition of the software. However, few organization cloud customers are not willing to step to cloud computing up on a big scale because of the safety problems present in cloud computing. One more disadvantage of Cloud is it’s not suitable for another revolutionary technology i.e.IoT(Internet of things)In this paper we are going to present the Advantages of Fog Computing and Decoy technology to address the security in cloud computing by extending it into fog computing.Fog Computing is a new paradigm in which the computing power moves to the edge of the network. So, it’s also called as Edge Computing.