Open Access Open Access  Restricted Access Subscription Access

Fog Computing: A Novel Approach to Provide Security in Cloud Computing


Affiliations
1 College of Computer Sciences and Information Technology, King Faisal University, Hofuf, Saudi Arabia
2 College of Computer Sciences and Information Technology, King Faisal University, Hofuf,, Saudi Arabia
 

Objective: Cloud Computing is the future solution which all companies in the world aim to depend on for its day to day operations because of its big advantages compared with that of the on premises systems. The major challenging issues in Cloud-based environment are security, user authentication, access control, and ensuring the security of stored data in Cloud servers which makes most of the functional and technical people to work on the aspects of security and to provide a solution to secure Cloud computing. Methods: Fog computing is one of the solutions created by Cisco and it is defined as the extension of the Cloud Computing paradigm, its distinctive characteristics in the location sensitivity, wireless connectivity, and geographical accessibility. Accordingly, this research offers an efficient user authentication scheme for Cloud computing by designing the user authentication and access control at the Fog level where, a client-based user authentication methodology has been introduced to confirm identity of the user at client-side to access the Cloud which will enhance the reliability and rate of trust in Cloud computing environments. The system currently being proposed is implemented on mobile devices using an application connected to a Fog node which is further connected to the Cloud node. Findings: In overall, the analysis of the suggested scheme shows that, designing this user authentication and access control model will enhance the security and rate of trust in Cloud computing environments as an emerging and powerful technology in various industries. Application: By incorporating the secured scheme of authentication, Security of Cloud computing environments can be enhanced and protect the system from unauthorized users.

Keywords

Authentication, Cloud Computing, Fog Computing, Man-in-Middle, SMS
User

Abstract Views: 198

PDF Views: 0




  • Fog Computing: A Novel Approach to Provide Security in Cloud Computing

Abstract Views: 198  |  PDF Views: 0

Authors

Abdullah AlNuaim
College of Computer Sciences and Information Technology, King Faisal University, Hofuf, Saudi Arabia
Shakeel Ahmed
College of Computer Sciences and Information Technology, King Faisal University, Hofuf,, Saudi Arabia

Abstract


Objective: Cloud Computing is the future solution which all companies in the world aim to depend on for its day to day operations because of its big advantages compared with that of the on premises systems. The major challenging issues in Cloud-based environment are security, user authentication, access control, and ensuring the security of stored data in Cloud servers which makes most of the functional and technical people to work on the aspects of security and to provide a solution to secure Cloud computing. Methods: Fog computing is one of the solutions created by Cisco and it is defined as the extension of the Cloud Computing paradigm, its distinctive characteristics in the location sensitivity, wireless connectivity, and geographical accessibility. Accordingly, this research offers an efficient user authentication scheme for Cloud computing by designing the user authentication and access control at the Fog level where, a client-based user authentication methodology has been introduced to confirm identity of the user at client-side to access the Cloud which will enhance the reliability and rate of trust in Cloud computing environments. The system currently being proposed is implemented on mobile devices using an application connected to a Fog node which is further connected to the Cloud node. Findings: In overall, the analysis of the suggested scheme shows that, designing this user authentication and access control model will enhance the security and rate of trust in Cloud computing environments as an emerging and powerful technology in various industries. Application: By incorporating the secured scheme of authentication, Security of Cloud computing environments can be enhanced and protect the system from unauthorized users.

Keywords


Authentication, Cloud Computing, Fog Computing, Man-in-Middle, SMS



DOI: https://doi.org/10.17485/ijst%2F2018%2Fv11i15%2F172576