Header menu link for other important links
Secure Fog Computing System using Emoticon Technique
Harish Kumar, Sampada Shinde,
Published in Auricle Technologies Pvt. Ltd.
Volume: 5.0
Issue: 7.0
Fog computing is a distributed computing infrastructure in whichsome application services are provided at the edge of the network in smart devices( IoT devices) and some applications are handled in cloud. Fog computing operates on network ends instead of working entirely from a centralized cloud. It facilitates the operation of storage, compute, analysis and other services between edge devices mostly IoT devices and cloud computing data centres. The main objective of Fog computing is to process the data close to the edge devices .The problem that occurs in Fog is confidentiality and security of data . To overcome this problem, we have proposed the Dual-Encryption to data using Emoticon Technique which is combination of Cryptography and Steganography. In this method, first data is encrypted and then encrypted data is hidden with the cover text like emoticons. So Dual-Encryption enhances data security and reliability. Even if the covered text is accessed by unauthorized person, only encrypted data of original data can be viewed not the actual data.
About the journal
JournalInternational Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC)
PublisherAuricle Technologies Pvt. Ltd.
Open Access0