首页> 外文期刊>Indian Journal of Science and Technology >Fog Computing: A Novel Approach to Provide Security in Cloud Computing
【24h】

Fog Computing: A Novel Approach to Provide Security in Cloud Computing

机译:雾计算:一种提供云计算安全性的新颖方法

获取原文
           

摘要

Objective: Cloud Computing is the future solution which all companies in the world aim to depend on for its day to day operations because of its big advantages compared with that of the on premises systems. The major challenging issues in Cloud-based environment are security, user authentication, access control, and ensuring the security of stored data in Cloud servers which makes most of the functional and technical people to work on the aspects of security and to provide a solution to secure Cloud computing. Methods: Fog computing is one of the solutions created by Cisco and it is defined as the extension of the Cloud Computing paradigm, its distinctive characteristics in the location sensitivity, wireless connectivity, and geographical accessibility. Accordingly, this research offers an efficient user authentication scheme for Cloud computing by designing the user authentication and access control at the Fog level where, a client-based user authentication methodology has been introduced to confirm identity of the user at client-side to access the Cloud which will enhance the reliability and rate of trust in Cloud computing environments. The system currently being proposed is implemented on mobile devices using an application connected to a Fog node which is further connected to the Cloud node. Findings: In overall, the analysis of the suggested scheme shows that, designing this user authentication and access control model will enhance the security and rate of trust in Cloud computing environments as an emerging and powerful technology in various industries. Application: By incorporating the secured scheme of authentication, Security of Cloud computing environments can be enhanced and protect the system from unauthorized users.
机译:目标:由于云计算与本地系统相比具有很大的优势,因此它是全世界所有公司都希望依靠其进行日常运营的未来解决方案。在基于云的环境中,主要的挑战性问题是安全性,用户身份验证,访问控制以及确保Cloud服务器中存储数据的安全性,这使得大多数功能和技术人员都必须致力于安全方面并提供解决方案。安全的云计算。方法:雾计算是思科创建的解决方案之一,被定义为云计算范式的扩展,其在位置敏感性,无线连接性和地理可访问性方面的独特特征。因此,这项研究通过在Fog级别设计用户身份验证和访问控制,为云计算提供了一种有效的用户身份验证方案,其中引入了基于客户端的用户身份验证方法,以在客户端确认用户身份以访问客户端。云计算将提高云计算环境中的可靠性和信任度。当前提出的系统是使用连接到Fog节点的应用程序在移动设备上实现的,该应用程序还连接到Cloud节点。结果:总体而言,对建议方案的分析表明,设计此用户身份验证和访问控制模型将提高云计算环境中作为一种新兴且功能强大的技术的安全性和信任度。应用程序:通过合并安全的身份验证方案,可以增强云计算环境的安全性并保护系统免受未经授权的用户的侵害。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号