UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 4
April-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1904643


Registration ID:
203721

Page Number

235-238

Share This Article


Jetir RMS

Title

Fog Computing: Defense from Security Threats Cyber Attacks and Prevention

Abstract

: - Fog computing is currently daily in favor of all sorts of business units. We can access and store all types of application and data in Fog . As it comes up with a lot of facilities, it becomes exhausting to entrust security. Fog computing provides different security approaches than conventional slant like cryptography. By observing actions and reactions of user whereas accessing the info, we will realize the abnormal behavior. If unauthorized access detected even after prying difficult queries verification, then we can introduce disinformation attack and provide the fake worthless information to attacker. It will be useful to regulate effectiveness of data. Experiments done by author, shows that, this method might give extraordinary level of security for knowledge in Fog computing atmosphere. Fog computing is preventive disinformation attack.

Key Words

Cryptography1, Fog computing2, Entrust security3, .

Cite This Article

"Fog Computing: Defense from Security Threats Cyber Attacks and Prevention", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 4, page no.235-238, April-2019, Available :http://www.jetir.org/papers/JETIR1904643.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Fog Computing: Defense from Security Threats Cyber Attacks and Prevention", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 4, page no. pp235-238, April-2019, Available at : http://www.jetir.org/papers/JETIR1904643.pdf

Publication Details

Published Paper ID: JETIR1904643
Registration ID: 203721
Published In: Volume 6 | Issue 4 | Year April-2019
DOI (Digital Object Identifier):
Page No: 235-238
Country: new delhi, delhi, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002860

Print This Page

Current Call For Paper

Jetir RMS