scholarly journals Potentials of Fog Computing in Higher Education

Author(s):  
Arumugam So Raman

This paper is documenting the potential of Fog Computing in Education. First, this study explores the difference between cloud computing and Fog Computing. Then the features of computing explained briefly. A tremendous increase in Internet usage among the people does not allow the sustainability to continue depending on Cloud Computing as a centralized web server, due to the truth that Cloud Computing system allows access to internet data as well as therefore making it feasible for users to availability, share along with store information in remote servers. With Fog Computing, multiple users, gadgets such as automobiles, wearable gizmos, sensing units, wise gadgets, an organization can accept one another utilizing their very own Fog facilities. In the educational sector, Fog computing technology boosts educational operations and provides a platform with agility, versus slowing them down or quitting them. Fog computing is a modern technology that is set for high development in the future, as well as will substantially improve day-to-day procedures for many sectors, including education. Finally, security issues and challenges of implementation Fog computing discussed.

Author(s):  
Navin Jambhekar ◽  
Chitra Anil Dhawale

Information security is a prime goal for every individual and organization. The travelling from client to cloud server can be prone to security issues. The big data storages are available through cloud computing system to facilitate mobile client. The information security can be provided to mobile client and cloud technology with the help of integrated parallel and distributed encryption and decryption mechanism. The traditional technologies include the plaintext stored across cloud and can be prone to security issues. The solution provided by applying the encrypted data upload and encrypted search. The clouds can work in collaboration; therefore, the encryption can also be done in collaboration. Some part of encryption handle by client and other part handled by cloud system. This chapter presents the security scenario of different security algorithms and the concept of mobile and cloud computing. This chapter precisely defines the security features of existing cloud and big data system and provides the new framework that helps to improve the data security over cloud computing and big data security system.


2018 ◽  
pp. 1669-1693
Author(s):  
Amine Haouari ◽  
Zbakh Mostapha ◽  
Samadi Yassir

In this paper, the authors present a state of art survey of cloud computing, highlighting its architectural principles, implementation as well as research directions in this increasingly important domain. They cover the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system. Furthermore, in this survey the researchers highlight the concept of trust in digital environment as well as the use of containers like Docker, the block chain principle, artificial intelligence, last findings in the field of cryptography and other new concepts used in the domain of security and privacy related to cloud computing environments. They provide in the end an overview of the metrics which are mandatory in order to have a green flavor of cloud computing and the strategies that are currently used.


Author(s):  
Liwen He ◽  
Feiyi Huang ◽  
Jie Zhang ◽  
Bin Liu ◽  
Chunling Chen ◽  
...  

Cloud computing brings efficiency improvement on resource utilization nd other benefits such as on-demand service provisioning, location independence and biquitous access, elastic resource pooling, pay as usage pricing mode, etc. However, t also introduces new security issues because the data management and ownership re separated, and the management is operated on a virtualized platform. In this paper,  novel dynamic secure interconnection (DSI) mechanism is proposed to isolate he cloud computing system into a couple of dynamic virtual trust zones with different ecurity policies implemented for different customers so as to enhance security. xperimental results are presented to demonstrate the feasibility and effectiveness of he DSI mechanism.


10.29007/nc47 ◽  
2018 ◽  
Author(s):  
Manu Sharma

In the world of Digital Innovation “Cloud Computing” is not just a word or a technology but a paramount to the organizations now days. Because it is not easy to store, compute the data on an internet and central remote server to manage a huge bulk of data and information. It is well known that cloud computing provides data, storage of data, computation of data to the end user also by providing the services to the end users by the different applications. So, now the Fog Computing Is generally a concept to extend the cloud computing technology as it also does the same function which cloud computing functionality as well. It is not the replacement but the enhanced version of cloud which provides a security on the cloud environment by isolating user’s data which is saved on the Edge Devices. Fog Computing enables a user to save their data to nearby devices. In this paper the security issues also the technology which is used for security in this enhanced concept of cloud is mentioned.


2019 ◽  
pp. 639-656
Author(s):  
Navin Jambhekar ◽  
Chitra Anil Dhawale

Information security is a prime goal for every individual and organization. The travelling from client to cloud server can be prone to security issues. The big data storages are available through cloud computing system to facilitate mobile client. The information security can be provided to mobile client and cloud technology with the help of integrated parallel and distributed encryption and decryption mechanism. The traditional technologies include the plaintext stored across cloud and can be prone to security issues. The solution provided by applying the encrypted data upload and encrypted search. The clouds can work in collaboration; therefore, the encryption can also be done in collaboration. Some part of encryption handle by client and other part handled by cloud system. This chapter presents the security scenario of different security algorithms and the concept of mobile and cloud computing. This chapter precisely defines the security features of existing cloud and big data system and provides the new framework that helps to improve the data security over cloud computing and big data security system.


Author(s):  
Amine Haouari ◽  
Zbakh Mostapha ◽  
Samadi Yassir

In this paper, the authors present a state of art survey of cloud computing, highlighting its architectural principles, implementation as well as research directions in this increasingly important domain. They cover the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system. Furthermore, in this survey the researchers highlight the concept of trust in digital environment as well as the use of containers like Docker, the block chain principle, artificial intelligence, last findings in the field of cryptography and other new concepts used in the domain of security and privacy related to cloud computing environments. They provide in the end an overview of the metrics which are mandatory in order to have a green flavor of cloud computing and the strategies that are currently used.


2013 ◽  
Vol 846-847 ◽  
pp. 1600-1603
Author(s):  
Ao Qiu Pei ◽  
Min Yang ◽  
Yan Bin Tang

Cloud computing based on a large number of distributed computer gathers a wide variety of computing resources data and builds huge virtual resources space and provides information technology resources for the majority of computer users through the Internet. Security issues is one of the core elements which constrains the depth development of cloud computing. It also is the hot issue of research in this field. This paper first analyzes the architecture and threat signatures of cloud computing system and data application model based on the data of cloud computing and data security threat characteristics. It builds a data security implementation model under cloud computing. Based on this, it builds information security model of cloud computing strategy and analyzes configuration program of the model in the cloud computing.


2014 ◽  
Vol 571-572 ◽  
pp. 400-403
Author(s):  
Yan Fei Cao ◽  
Jun Ming Pan

This paper analyzed functions of the network information system based on trusted computing and trusted computing platform based on cloud computing. Raised the propose to expand the application of trusted computing technology to network information system, to meet the needs of cloud computing of trusted computing, trusted cloud computing, implement the trusted cloud computing. In our design, will take the Trusted Computing Platform (TCP) as the basis of cloud computing system, provide some important security functions to ensure the communication and data security.Finally put forward the implement methods.


The inventions in the field of Cloud computing with mobile devices, cloudlets, Edge computing are sizzling growth of IoT(Internet of Things) devices. The cloud computing technology has its limitation in various attributes such as bandwidth, latency, location awareness, resource constraints etc. In order to overcome these issues, the edge computing, which is known as manipulating the data at the edge of the network. In order to support various integrated features with IoT such as storage, networking, home energy management, augment reality fog computing provides resource access to the network edge of the user. In the user side it is confronted with serious security issues for data security. This article provides the augmentation and orchestration of security issues in fog computing. In this paper, first we check the architecture of fog computing. Then we suggest broad taxonomy of fog architecture with various architectures. Finally, this paper is concluded with scope and future research in fog computing


Sign in / Sign up

Export Citation Format

Share Document