Fog Computing: Comprehensive Approach for Security Data Theft Attack Using Elliptic Curve Cryptography and Decoy Technology

Mai Trung Dong, Xianwei Zhou
2016 OALib  
Fog computing extends cloud computing, provides the services like data, compute, storage and application to end user. It improves the quality of service and also reduces latency. According to Cisco, due to its wide geographical distribution, the Fog computing is well suited for real time analytics and big data. This article, by exploitation advantages of Fog computing Paradigm, analyzes its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular
more » ... , Wireless Sensor and Actuator Networks, Decentralized Smart Building Control, IoT and Cyber-physical systems and software defined networks, and reviews Comprehensive Approach for security Data Theft Attack the use of Elliptic Curve Cryptography (ECC) and decoy technology in such a constrained environment along with the other two aspects of ECC, namely its security and efficiency. In the article, the performance of ECC is compared with the other PKC applications which should prove that ECC performs well and is more suitable for Fog environments.
doi:10.4236/oalib.1102802 fatcat:hntozyqqnzgmbiiq6jwqw5lbea