Open Access Open Access  Restricted Access Subscription or Fee Access

FOG Computing: A Novel Perception to Minimize Attacks & Provide Security in Cloud Computing Environment

Yashpal Singh, Pooja ., Sonia Chaudhary

Abstract


Cloud is essentially a clusters of multiple faithful servers committed within a network. Cloud Computing is a network grounded atmosphere that emphases on distribution computations or assets. In cloud customers only recompense for what they consumption and have not to pay for local funds which they want such as storage or infrastructure. So this is the chief benefit of cloud computing and chief aim for achievement fame in today’s world. Also cloud computing is individual of the most stimulating skill unpaid to its skill to decrease cost related with computing while cumulative suppleness and scalability for computer procedures. But in cloud the chief problematic that happens is security and currently a days security and privacy together are chief apprehension that desirable to be measured. To overwhelm the problematic of security we are familiarizing the new method which is called as Fog Computing. Fog Computing is not a standby of cloud it is just spreads the cloud computing by provided that security in the cloud environment. With Fog services we are capable to improve the cloud knowledge by dividing users data that essential to live on the edge. The chief purpose of fog computing is to place the data close to the end user.

Full Text:

PDF

References


Cloud Computing for Dummies.

Muqtyar Ahmed S., Namratha P., Nagesh C. Prevention Of Malicious Insider In The Cloud Using Decoy Documents.

Soknacki A., Somayaji A. Cloud Security: Attacks and Current Defenses Gehana Booth.

Singh A., Shrivastava M. Overview of Attacks on Cloud Computing.

http://www.pewinternet.org/Reports/2009/18–Social-Isolation-and-New-Technology.aspx.

http://www.informaworld.com/smpp/content~db=all~content=a929065326.

https://en.wikipedia.org/wiki/Cloud-Computing.

Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,” March 2010. [Online].Available:https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf.


Refbacks

  • There are currently no refbacks.