Abstract
At first, change happened painfully. The Internet has grown in forms we never might have expected. Fog calculation is a new computing paradigm which extends cloud computing to the edges of the network. Nowadays, privacy and security is one of very challenges for the Internet of Things (IoT). Tiny devices are facing such a challenge due to lack of awareness in user for improper devices updates from time to time, lack of knowledge and not following proper security channel. I would like to explain the IoT systems background and its different kind of security parameter which is having different kind of security parameter and privacy challenges, we will explain here our various scheme and demonstrate for network security so that we can determine network security about the fog-computing model and it’s used to boost the reliability and efficacy of the delivery of IoT certificates. The basic concept of the bloom philtre is seen in Fig. 2. While a false positive match in the bloom philtres is probable, a false negative is not probable. I will describe the fog networking security summary how to solve this problem in our method and the overall it will see in result graph also.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hassan WH (2019) Current research on internet of things (IoT) security: a survey. Comput Netw 148:283–294
Vaquero LM, Rodero-Merino L (2014) Finding your way in the fog: towards a comprehensive definition of fog computing ACM SIGCOMM. Comput Commun Rev 44:27–32
Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 workshop on mobile big data, New York, pp 37–42
Dastjerdi AV, Gupta H, Calheiros RN, Ghosh SK, Buyya R (2016) Fog computing: principals, architectures, and applications. ar**v preprint ar**v:1601.02752
Yannuzzi M, Milito R, Serral-Gracia R, Montero D, Nemirovsky M (2014) Key ingredients in an IoT recipe: fog computing, cloud computing, and more fog computing. In: 2014 IEEE 19th international workshop on computer aided modeling and design of communication links and networks (CAMAD), pp 325–329
Siby S, Maiti RR, Tippenhauer NO (2017) Iotscanner: detecting privacy threats in IoT neighborhoods. In: Proceedings of the 3rd ACM international workshop on IoT privacy, trust, and security, Abu DhabiUnited Arab Emirates, pp 23–30
Chiang M, Ha S, Risso CLIF, Zhang T (2017) Clarifying fog computing and networking: 10 questions and answers. IEEE Commun Mag 55(4):18–20
Roman R, Lopez J, Mambo M (2016) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst
Loke SW (2015) The internet of flying-things: opportunities and challenges with airborne fog computing and mobile cloud in the clouds. ar**v preprint ar**v:1507.04492
Conti M, Dehghantanha A, Franke K, Watson S (2018) Internet of things security and forensics: challenges and opportunities. Future Gener Comput Syst 78:544–546 [CrossRef]
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Singh, J.K., Goel, A.K. (2022). Data Security Through Fog Computing Paradigm Using IoT. In: Gupta, G., Wang, L., Yadav, A., Rana, P., Wang, Z. (eds) Proceedings of Academia-Industry Consortium for Data Science. Advances in Intelligent Systems and Computing, vol 1411. Springer, Singapore. https://doi.org/10.1007/978-981-16-6887-6_9
Download citation
DOI: https://doi.org/10.1007/978-981-16-6887-6_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-6886-9
Online ISBN: 978-981-16-6887-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)