Fog Computing: Common Security Issues and Proposed Countermeasures

被引:0
作者
Kumar, Praveen [1 ]
Zaidi, Nabeel [1 ]
Choudhury, Tanupriya [1 ]
机构
[1] Amity Univ, Noida, Uttar Pradesh, India
来源
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART-2016) | 2016年
关键词
Fog Computing; Cloud Computing; Security; Privacy; Decoy Technique;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is one of the most important paradigms used in modern world as an extension to cloud computing. Like Cloud Computing, it provides data storage, manipulation and computation of data, but to the edge of the network, i.e. to the user end. This research paper deals with the threat to security issues, especially with location privacy and data confidentiality. The way service providers as well as government can access users data is covered. Furthermore the misconceptions about the rights of users are discussed. Finally the concept of decoy technique with some modification for location and data privacy is also covered.
引用
收藏
页码:311 / 315
页数:5
相关论文
共 12 条
[1]  
Ahmed Monjour, CLOUD COMPUTING SECU
[2]  
ChandraHasan K., 2012, INT J COMPUTATIONAL, V3
[3]  
Hamlin Kevin, UTDCS0210
[4]  
Harfoushi Osama, 2016, DATA SECURITY ISSUES, V6
[5]  
Kauba Christof, 2013, WHEN CLOUDS DISPERSE
[6]  
Kshamata Prachi Unathi, INT J SCI RES
[7]  
Kudoo Saniket M., 2016, INT J INNOVATIVE RES, V4
[8]  
Niranjanamurthi, 2016, RES STUDY FOG COMPUT, V5
[9]  
Raut Rajashri, 2014, FOG COMPUTING USING, V3
[10]  
Stojmenovic I., 2014, FOG COMPUTING PARADI