首页    期刊浏览 2025年05月25日 星期日
登录注册

文章基本信息

  • 标题:Secure Third Party Auditor(TPA) for Ensuring Data Integrity in Fog Computing Full Text
  • 本地全文:下载
  • 作者:KashifMunir ; Lawan A. Mohammed
  • 期刊名称:International Journal of Network Security & Its Applications
  • 印刷版ISSN:0975-2307
  • 电子版ISSN:0974-9330
  • 出版年度:2018
  • 卷号:10
  • 期号:6
  • 出版社:Academy & Industry Research Collaboration Center (AIRCC)
  • 摘要:

    Fog computing is an extended version of Cloud computing. It minimizes the latency by incorporating Fog servers as intermediates between Cloud Server and users. It also provides services similar to Cloud like Storage, Computation and resources utilization and security.Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on the heterogeneous hardware. These features make the Fog platform highly suitable for time and location-sensitive applications. For example, the Internet of Things (IoT) devices isrequired to quickly process a large amount of data. The Significance of enterprise data and increased access rates from low-resource terminal devices demands for reliable and low- cost authentication protocols. Lots of researchers have proposed authentication protocols with varied efficiencies.As a part of our contribution, we propose a protocol to ensure data integrity which is best suited for fog computing environment.

  • 关键词:Protocol; Authentication;Fog Computing; Security Threats; IoT
国家哲学社会科学文献中心版权所有