UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 10 Issue 8
August-2023
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2308374


Registration ID:
523411

Page Number

d578-d582

Share This Article


Jetir RMS

Title

ENHANCED ENCRYPTION MODEL IN FOG COMPUTING WITH DATA FRAGMENTATION

Abstract

Data security in conventional applications was only available at the application layer. The package's security is guaranteed in the planned study. The necessity for a new security system emerged as a result of the shortcomings of existing security systems. Without authentication, there should be less chance of decryption. The establishment of decentralized security is necessary to fend off attacks from various networks. According to claims, the proposed encryption standard will enhance multilayer security. This technique divides the content into two pieces and offers a trustworthy transmission mechanism. Hackers cannot weaken the security system thanks to the system. To stop attackers, security was required in a cloud and edge environment. The two fish technique was created to improve data transmission security and dependability over various networks. Its security system has helped it withstand hacker or cracker attacks. The proposed article suggests a study on the security of slicing-based edge transmissions. To stop attackers from attacking from many networks, decentralised security must be developed. Layered security will also strengthen strong encryption standards. Computer security edge generators have been the subject of numerous investigations. Many of these have already been talked about. The suggested study divides the data into two pieces that are additionally encrypted at various levels in order to create a trustworthy transmission technique. Multilayer encryption has evolved, improving the security and dependability of data transmission via networks. By using this method, the security system became impervious to hacker and cracker attacks.

Key Words

data security ,encryption,decryption,multilayer encryption

Cite This Article

"ENHANCED ENCRYPTION MODEL IN FOG COMPUTING WITH DATA FRAGMENTATION", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.10, Issue 8, page no.d578-d582, August-2023, Available :http://www.jetir.org/papers/JETIR2308374.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"ENHANCED ENCRYPTION MODEL IN FOG COMPUTING WITH DATA FRAGMENTATION", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.10, Issue 8, page no. ppd578-d582, August-2023, Available at : http://www.jetir.org/papers/JETIR2308374.pdf

Publication Details

Published Paper ID: JETIR2308374
Registration ID: 523411
Published In: Volume 10 | Issue 8 | Year August-2023
DOI (Digital Object Identifier):
Page No: d578-d582
Country: district jhajjar, haryana, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00070

Print This Page

Current Call For Paper

Jetir RMS