CFP last date
20 May 2024
Reseach Article

Fogging: An Advanced Version of Cloud Storage

by Md. Tareq Hasan, Md. Mustafijur Rahman, Rajib Chakrabarty
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 46
Year of Publication: 2020
Authors: Md. Tareq Hasan, Md. Mustafijur Rahman, Rajib Chakrabarty
10.5120/ijca2020919976

Md. Tareq Hasan, Md. Mustafijur Rahman, Rajib Chakrabarty . Fogging: An Advanced Version of Cloud Storage. International Journal of Computer Applications. 177, 46 ( Mar 2020), 13-16. DOI=10.5120/ijca2020919976

@article{ 10.5120/ijca2020919976,
author = { Md. Tareq Hasan, Md. Mustafijur Rahman, Rajib Chakrabarty },
title = { Fogging: An Advanced Version of Cloud Storage },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2020 },
volume = { 177 },
number = { 46 },
month = { Mar },
year = { 2020 },
issn = { 0975-8887 },
pages = { 13-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number46/31216-2020919976/ },
doi = { 10.5120/ijca2020919976 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:48:46.955493+05:30
%A Md. Tareq Hasan
%A Md. Mustafijur Rahman
%A Rajib Chakrabarty
%T Fogging: An Advanced Version of Cloud Storage
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 46
%P 13-16
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the new era of digital world, cloud computing has become the traditional way of data storage. In this paper, we are going to introduce a new technology which is known as fog computing. Fog is used for high security and protection of big data. The main concentration is for processing here.

References
  1. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud, USA
  2. Ben-Salem M., and Stolfo Angelos D. Keromytis, “Fog computing: Mitigating Insider Data Theft Attacks in the Cloud,” IEEE symposium on security and privacy workshop (SPW) 2012.
  3. Ben-Salem M., and Stolfo, “Decoy Document Deployment for Effective Masquerade Attack Detection,” Computer Science Department, Columbia University, New York.
  4. F. Bonomi, "Connected vehicles, the internet of things, and fog computing," in The Eighth ACM International Workshop on Vehicular Inter-Networking (VANET), Las Vegas, USA, 2011.
  5. F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the internet of things," in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC'12. ACM, 2012, pp. 13-16.
  6. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50-58, Apr 2010.
  7. C. Wei, Z. Fadlullah, N. Kato, and I. Stojmenovic, "On optimally reducing power loss in micro-grids with power storage devices," IEEE Journal of Selected Areas in Communications, 2014 to appear.
  8. L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Comput. Netw., vol. 54, no. 15, pp. 2787-2805, Oct. 2010.
  9. K. Liu, J. Ng, V. Lee, S. Son, and I. Stojmenovic, "Cooperative data dissemination in hybrid vehicular networks: Vanet as a software defined network," Submitted for publication, 2014.
  10. K. Kirkpatrick, "Software-defined networking," Common. ACM, vol. 56, no. 9, pp. 16-19, Sep. 2013.
  11. Cisco, "Cisco delivers vision of fog computing to accelerate value from billions of connected devices," Cisco, Tech. Rep., Jan. 2014.
  12. K. Hong, D. Lillethun, U. Ramachandran, B. Ottenw¿¿lder, and B. Koldehofe, "Opportunistic spatio-temporal event processing for mobile situation awareness," in Proceedings of the 7th ACM International Conference on International Journal of Engineering Science and Computing, March 2016 2709 http://ijesc.org/ Distributed Event-based Systems, ser. DEBS'13. ACM, 2013, pp. 195-206.
  13. H. Madsen, G. Albeanu, B. Burtschy, and F. Popentiu-Vladicescu, "Reliability in the utility computing era: Towards reliable fog computing," in Systems, Signals and Image Processing (IWSSIP), 2013 20th International Conference on, July 2013, pp. 43-46.
  14. K. Hong, D. Lillethun, U. Ramachandran, B. Ottenw lder, and B. Koldehofe, "Mobile fog: A programming model for large-scale applications on the internet of things," in Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, ser. MCC'13. ACM, 2013, pp. 15-20.
Index Terms

Computer Science
Information Sciences

Keywords

IoT Cloud computing Fog computing.