Open Access
Subscription Access
Open Access
Subscription Access
Fog Computing: Common Security Issues and Proposed Countermeasure for Intrusion due to Password Theft
Subscribe/Renew Journal
Fog computing is one of the most important decentralized computing infrastructure in which data, computation, storage and applications are distributed in the most logical and efficient way between the data source and the cloud. It is extension of cloud computing and provides data storage, processing and computation of data just like cloud computing itself, but is located at the edge of the network, i.e. at the user end. This research paper deals with the security, privacy and data confidentiality issues in fog computing. Main sources of attacks on fog and cloud by service providers, hackers, government agencies and other organizations that access user’s data is covered. Furthermore, current security solutions are discussed. Finally, the concept of decoy technique with some modification for data privacy in case of password theft is covered.
Keywords
Authentication, Cloud Computing, Device Identifier, Device Token, Fog Computing, IoT, Privacy, Password Theft, Push Notification, Security.
User
Subscription
Login to verify subscription
Font Size
Information
Abstract Views: 228
PDF Views: 0