You are here

Decoy technique for preserving the privacy in fog computing

TitleDecoy technique for preserving the privacy in fog computing
Publication TypeConference Proceedings
Year of Conference2021
AuthorsMadavi, K. P. Bindu, and P. Vijayakarthick
Conference NameLecture Notes on Data Engineering and Communications Technologies
Volume53
Pagination89 - 94
Date Published2021
PublisherSpringer
ISBN Number23674512 (ISSN)
KeywordsComputer Science and Engineering, Scopus
Abstract

Fog computing is a process which computes and stores the data, which facilities network services between computing information enters and end devices. Fog computing is additionally fogging or edge computing. Fog computing focuses on increasing the efficiency and to quicken the data computing to cloud for storage and processing. This paper is mainly focus on securing personal information within the cloud employing a fog computing facility and decoy techniques. In the proposed system primary stage each licensed and unauthorized user can refer to the decoy information in fog computing. Using user profiling technique, the authorized user will be identified. If it’s an unauthorized user, they cannot access the original data. If it is an authorized user, then it proceeds to the second stage by verifying the challenges. The challenge can be secured with verification code or else it can be a private question. Once authorized users clear the security challenge, they can access the original data. © Springer Nature Singapore Pte Ltd 2021.

DOI10.1007/978-981-15-5258-8_10
Short TitleLecture. Notes. Data Eng. Commun. Tech.