Data Security Through Fog Computing Paradigm Using IoT

  • Conference paper
  • First Online:
Proceedings of Academia-Industry Consortium for Data Science

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1411))

  • 421 Accesses

Abstract

At first, change happened painfully. The Internet has grown in forms we never might have expected. Fog calculation is a new computing paradigm which extends cloud computing to the edges of the network. Nowadays, privacy and security is one of very challenges for the Internet of Things (IoT). Tiny devices are facing such a challenge due to lack of awareness in user for improper devices updates from time to time, lack of knowledge and not following proper security channel. I would like to explain the IoT systems background and its different kind of security parameter which is having different kind of security parameter and privacy challenges, we will explain here our various scheme and demonstrate for network security so that we can determine network security about the fog-computing model and it’s used to boost the reliability and efficacy of the delivery of IoT certificates. The basic concept of the bloom philtre is seen in Fig. 2. While a false positive match in the bloom philtres is probable, a false negative is not probable. I will describe the fog networking security summary how to solve this problem in our method and the overall it will see in result graph also.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 181.89
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 235.39
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hassan WH (2019) Current research on internet of things (IoT) security: a survey. Comput Netw 148:283–294

    Article  Google Scholar 

  2. Vaquero LM, Rodero-Merino L (2014) Finding your way in the fog: towards a comprehensive definition of fog computing ACM SIGCOMM. Comput Commun Rev 44:27–32

    Google Scholar 

  3. Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 workshop on mobile big data, New York, pp 37–42

    Google Scholar 

  4. Dastjerdi AV, Gupta H, Calheiros RN, Ghosh SK, Buyya R (2016) Fog computing: principals, architectures, and applications. ar**v preprint ar**v:1601.02752

  5. Yannuzzi M, Milito R, Serral-Gracia R, Montero D, Nemirovsky M (2014) Key ingredients in an IoT recipe: fog computing, cloud computing, and more fog computing. In: 2014 IEEE 19th international workshop on computer aided modeling and design of communication links and networks (CAMAD), pp 325–329

    Google Scholar 

  6. Siby S, Maiti RR, Tippenhauer NO (2017) Iotscanner: detecting privacy threats in IoT neighborhoods. In: Proceedings of the 3rd ACM international workshop on IoT privacy, trust, and security, Abu DhabiUnited Arab Emirates, pp 23–30

    Google Scholar 

  7. Chiang M, Ha S, Risso CLIF, Zhang T (2017) Clarifying fog computing and networking: 10 questions and answers. IEEE Commun Mag 55(4):18–20

    Google Scholar 

  8. Roman R, Lopez J, Mambo M (2016) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst

    Google Scholar 

  9. Loke SW (2015) The internet of flying-things: opportunities and challenges with airborne fog computing and mobile cloud in the clouds. ar**v preprint ar**v:1507.04492

  10. Conti M, Dehghantanha A, Franke K, Watson S (2018) Internet of things security and forensics: challenges and opportunities. Future Gener Comput Syst 78:544–546 [CrossRef]

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jayant Kumar Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, J.K., Goel, A.K. (2022). Data Security Through Fog Computing Paradigm Using IoT. In: Gupta, G., Wang, L., Yadav, A., Rana, P., Wang, Z. (eds) Proceedings of Academia-Industry Consortium for Data Science. Advances in Intelligent Systems and Computing, vol 1411. Springer, Singapore. https://doi.org/10.1007/978-981-16-6887-6_9

Download citation

Publish with us

Policies and ethics

Navigation