Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Fog Computing: Common Security Issues and Proposed Countermeasure for Intrusion due to Password Theft


Affiliations
1 Department of Computer Applications, NIT Jamshedpur, India
     

   Subscribe/Renew Journal


Fog computing is one of the most important decentralized computing infrastructure in which data, computation, storage and applications are distributed in the most logical and efficient way between the data source and the cloud. It is extension of cloud computing and provides data storage, processing and computation of data just like cloud computing itself, but is located at the edge of the network, i.e. at the user end. This research paper deals with the security, privacy and data confidentiality issues in fog computing. Main sources of attacks on fog and cloud by service providers, hackers, government agencies and other organizations that access user’s data is covered. Furthermore, current security solutions are discussed. Finally, the concept of decoy technique with some modification for data privacy in case of password theft is covered.

Keywords

Authentication, Cloud Computing, Device Identifier, Device Token, Fog Computing, IoT, Privacy, Password Theft, Push Notification, Security.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 229

PDF Views: 0




  • Fog Computing: Common Security Issues and Proposed Countermeasure for Intrusion due to Password Theft

Abstract Views: 229  |  PDF Views: 0

Authors

Riyaz Ahmad Shah
Department of Computer Applications, NIT Jamshedpur, India
Danish Khan Khan
Department of Computer Applications, NIT Jamshedpur, India

Abstract


Fog computing is one of the most important decentralized computing infrastructure in which data, computation, storage and applications are distributed in the most logical and efficient way between the data source and the cloud. It is extension of cloud computing and provides data storage, processing and computation of data just like cloud computing itself, but is located at the edge of the network, i.e. at the user end. This research paper deals with the security, privacy and data confidentiality issues in fog computing. Main sources of attacks on fog and cloud by service providers, hackers, government agencies and other organizations that access user’s data is covered. Furthermore, current security solutions are discussed. Finally, the concept of decoy technique with some modification for data privacy in case of password theft is covered.

Keywords


Authentication, Cloud Computing, Device Identifier, Device Token, Fog Computing, IoT, Privacy, Password Theft, Push Notification, Security.