1. Fog computing security using token-based authentication system.
- Author
-
Chaudhary, Tanisha, Kush, Rudransh, Gautam, Shubham, Patnaik, Sai Suvam, and Singh, Simar Preet
- Subjects
SERVER farms (Computer network management) ,DATA encryption ,CLOUD computing ,FOG - Abstract
The concept of fog computing refers to the concept of extending the capabilities of cloud computing to the edge of the networks, while reducing the service latency and improving the overall efficiency of the network. Due to the unique characteristics of fog computing, such as its ability to handle large-scale geo-distribution and mobility, security and privacy concerns have been raised repeatedly. From a security standpoint, the transition to the cloud has presented various uncharted risks and challenges, undermining the efficiency of established protective systems. As a result, this paper aims to propose a security solution which consist of Multi-Level-Authentication for the user as well as device verification and data encryption. This will provide users with a safe and secure access to the cloud network and various data centers. Using this method, we are adding a token-based authentication system between the layers of fog and cloud which will keep data secure while being transferred from one layer to another layer by associating a decryption key along with the data which will be sent in a form of token. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF