Читать книгу Integration of Cloud Computing with Internet of Things - Группа авторов - Страница 60
3
An Efficient Fog-Based Model for Secured Data Communication
ОглавлениеV. Lakshman Narayana1* and R. S. M. Lakshmi Patibandla2†
1Department of IT, Vignan’s Nirula Institute of Technology & Science for Women. Peda Palakaluru, Guntur, Andhra Pradesh, India
2Department of IT, Vignan’s Foundation for Science, Technology and Research, Guntur, Andhra Pradesh, India
Abstract
Fog Computing is an effective computing model that expands Cloud Computing administrations to the edge of the system to provide security for the data. The new features offered by Fog Computing if effectively applied for time-sensitive applications that can possibly quicken the revelation of early crisis circumstances to help smart dynamic applications. While promising, how to plan and grow certifiable fog registering based information checking frameworks is as yet an open issue. As an initial step to address this issue, in the proposed work, a fog based model for Secured data communication is developed and shows the functional relevance and centrality of such a framework. In this work, a unique Fog Based elevated level programming model for sensitive applications that are geospatially circulated, enormous scope is designed. The fog registering system gives the model to oversee IoT benefits in the fog prospect by methods for a certifiable proving position. Moreover, the system encourages the communication between the gadgets, fog gadget arrangements, IoT administration and dynamic asset provisioning in a secured way. The proposed model overcomes communication issues in IoT gadgets to build up a powerful programming condition with fog computing method in performing resource handling, validations and IoT device arrangements. The proposed Fog Computing model effectively establishes communication among IoT devices and provides security to the data during communication.
Keywords: Secure data transmission, data empowerment, communication, security, IoT device security, resource handling