CFP last date
22 April 2024
Reseach Article

Comparison of Security and Performance Issues in Fog Enabled Cloud Computing

by C. Nagarani, R. Kousalya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 22
Year of Publication: 2018
Authors: C. Nagarani, R. Kousalya
10.5120/ijca2018916511

C. Nagarani, R. Kousalya . Comparison of Security and Performance Issues in Fog Enabled Cloud Computing. International Journal of Computer Applications. 180, 22 ( Feb 2018), 29-32. DOI=10.5120/ijca2018916511

@article{ 10.5120/ijca2018916511,
author = { C. Nagarani, R. Kousalya },
title = { Comparison of Security and Performance Issues in Fog Enabled Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2018 },
volume = { 180 },
number = { 22 },
month = { Feb },
year = { 2018 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number22/29067-2018916511/ },
doi = { 10.5120/ijca2018916511 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:01:29.288083+05:30
%A C. Nagarani
%A R. Kousalya
%T Comparison of Security and Performance Issues in Fog Enabled Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 22
%P 29-32
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Fog computing is a paradigm that extends the cloud computing and services to the edge of the network. Similar to services to end users. However, several challenges are addressed in fog computing in terms of security, authentication and authorization, privacy, revocation handling and data auditing techniques. This paper reviews various existing research work based on authentication, dynamic updation , access control in fog computing and provides merits and demerits of each system.

References
  1. Ibrahim, M. H. (2016). Octopus: An Edge-fog Mutual Authentication Scheme. IJ Network Security, 18(6), 1089-1101.
  2. Wang, H., Wang, Z., & Domingo-Ferrer, J. (2017). Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Generation Computer Systems.
  3. Alrawais, A., Alhothaily, A., Hu, C., Xing, X., & Cheng, X. (2017). An Attribute-Based Encryption Scheme to Secure Fog Communications. IEEE Access.
  4. Li, W. M., Li, X. L., Wen, Q. Y., Zhang, S., & Zhang, H. (2017). Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System. Journal of Computer Science and Technology, 32(5), 974-990.
  5. Alrawais, A., Alhothaily, A., Hu, C., Xing, X., & Cheng, X. (2017). An Attribute-Based Encryption Scheme to Secure Fog Communications. IEEE Access.
  6. Wan, Z., Liu, J. E., & Deng, R. H. (2012). HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE transactions on information forensics and security, 7(2), 743-754.
  7. Singh, A. P., & Pasupuleti, S. K. (2016). Optimized Public Auditing and Data
  8. Dynamics for Data Storage Security in Cloud Computing. Procedia Computer Science, 93, 751-759.
Index Terms

Computer Science
Information Sciences

Keywords

Fog Computing Cloud Computing Cloud Service Provider Authentication Access Control