Handling Security Issues in Fog Computing Environment Using Blowfish Encryption Algorithm

Lecture Notes in Electrical EngineeringEmergent Converging Technologies and Biomedical Systems(2022)

引用 0|浏览0
暂无评分
摘要
AbstractThere are different applications for different IoTs, hence IoT is a technology that is diverse in terms of applications. IoT devices do not have their own capability of storage, processing or computing, so we use IoT with cloud computing, as cloud provides pay as per use services such as; on-demand, scalable and shared resources. But due to the enormous growth in IoT devices cloud computing has issues like; low latency, location awareness and immediate data processing. Another computing paradigm like cloud computing was introduced by Cisco, with the difference to provide services near to the end devices in the network, called fog computing. Fog computing introduces a new layer, called fog layer between cloud and end devices, which help to resolve the problems that occurred in cloud. Fog computing has its own issues which required to be explored. In this paper, the security issue of fog has been discussed. This paper proposes a security system for fog environment by using Blowfish algorithm, Third Party Auditor and Three-way hand shaking method.KeywordsIoTFog computingCloud computing
更多
查看译文
关键词
fog computing environment,encryption,security issues
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要