Research Article

Comparison of Security and Performance Issues in Fog Enabled Cloud Computing

by  C. Nagarani, R. Kousalya
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Issue 22
Published: Feb 2018
Authors: C. Nagarani, R. Kousalya
10.5120/ijca2018916511
PDF

C. Nagarani, R. Kousalya . Comparison of Security and Performance Issues in Fog Enabled Cloud Computing. International Journal of Computer Applications. 180, 22 (Feb 2018), 29-32. DOI=10.5120/ijca2018916511

                        @article{ 10.5120/ijca2018916511,
                        author  = { C. Nagarani,R. Kousalya },
                        title   = { Comparison of Security and Performance Issues in Fog Enabled Cloud Computing },
                        journal = { International Journal of Computer Applications },
                        year    = { 2018 },
                        volume  = { 180 },
                        number  = { 22 },
                        pages   = { 29-32 },
                        doi     = { 10.5120/ijca2018916511 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2018
                        %A C. Nagarani
                        %A R. Kousalya
                        %T Comparison of Security and Performance Issues in Fog Enabled Cloud Computing%T 
                        %J International Journal of Computer Applications
                        %V 180
                        %N 22
                        %P 29-32
                        %R 10.5120/ijca2018916511
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Fog computing is a paradigm that extends the cloud computing and services to the edge of the network. Similar to services to end users. However, several challenges are addressed in fog computing in terms of security, authentication and authorization, privacy, revocation handling and data auditing techniques. This paper reviews various existing research work based on authentication, dynamic updation , access control in fog computing and provides merits and demerits of each system.

References
  • Ibrahim, M. H. (2016). Octopus: An Edge-fog Mutual Authentication Scheme. IJ Network Security, 18(6), 1089-1101.
  • Wang, H., Wang, Z., & Domingo-Ferrer, J. (2017). Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Generation Computer Systems.
  • Alrawais, A., Alhothaily, A., Hu, C., Xing, X., & Cheng, X. (2017). An Attribute-Based Encryption Scheme to Secure Fog Communications. IEEE Access.
  • Li, W. M., Li, X. L., Wen, Q. Y., Zhang, S., & Zhang, H. (2017). Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System. Journal of Computer Science and Technology, 32(5), 974-990.
  • Alrawais, A., Alhothaily, A., Hu, C., Xing, X., & Cheng, X. (2017). An Attribute-Based Encryption Scheme to Secure Fog Communications. IEEE Access.
  • Wan, Z., Liu, J. E., & Deng, R. H. (2012). HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE transactions on information forensics and security, 7(2), 743-754.
  • Singh, A. P., & Pasupuleti, S. K. (2016). Optimized Public Auditing and Data
  • Dynamics for Data Storage Security in Cloud Computing. Procedia Computer Science, 93, 751-759.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Fog Computing Cloud Computing Cloud Service Provider Authentication Access Control

Powered by PhDFocusTM