Implementation of Fog Computing in Cloud Enterprise for Data Security and Privacy Management
Poorva Khemaria1, Shiv Kumar2, Babita Pathik3
1Poorva Khemaria, M.Tech. Scholar, Department of Computer Science and Engineering, Lakshmi Narain College of Technology Excellence, Bhopal (M.P), India.
2Dr. Shiv Kumar, Professor & Head, Department of Computer Science and Engineering, Lakshmi Narain College of Technology Excellence, Bhopal (M.P), India.
3Babita Pathik, Assistant Professor, Department of Computer Science and Engineering, Lakshmi Narain College of Technology Excellence, Bhopal (M.P)-462021, India.
Manuscript received on February 20, 2017. | Revised Manuscript received on February 27, 2017. | Manuscript published on March 05, 2017. | PP: 3-6 | Volume-7 Issue-1, March 2017. | Retrieval Number: A2946037117/2017©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley
©The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Advancement of cloud technology named as fog computing. The process of fog computing faced a problem of latency and internet connectivity. The access of data over the fog computing need some trust based authentication and authorization process. In fog computing environment two major issue one is data leakage and other is location privacy. The location privacy preserve the user access and authentication process. The location privacy in fog computing is major issue. For the location privacy used various authentication and authorization process. To address these dangers, auditable information stockpiling administration has been proposed with regards to distributed computing to secure the information. Strategies, for example, holomorphic encryption and searchable encryption are consolidated to give uprightness, confidentiality and variability for distributed storage framework to permit a customer to check its information put away on untrusted servers. In this paper used Bloom filter data structure for the location privacy in fog computing model. The fog computing model work very efficiently in terms of low latency and high speed.
Keywords: WSN, AOI, POI, SA, BM, CEP.