International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 140

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015


FOG Computing Future of Cloud Computing

Kshamata Shenoy, Prachi Bhokare, Unnathi Pai


Abstract: Fog computing extends cloud computing, cloud computing provide data, compute, storage, and application services to end-user, also the fog computing also provide the services like data, compute, storage and application to end user. But in cloud the main problem that occurs is security and now a days security and privacy both are main concern that needed to be considered. Fog Computing is not a replacement of cloud it is just extends the cloud computing by providing security in the cloud environment. With Fog services we are able to enhance the cloud experience by isolating users- data that need to live on the edge. The main aim of the fog computing is to place the data close to the end user. The security issues are mentioned in this paper.


Keywords: Cloud Computing, Decoy, Fog Computing


Edition: Volume 4 Issue 6, June 2015,


Pages: 55 - 56


How to Cite this Article?

Kshamata Shenoy, Prachi Bhokare, Unnathi Pai, "FOG Computing Future of Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=27051502, Volume 4 Issue 6, June 2015, 55 - 56

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Cloud Computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'Decoy'

Downloads: 121

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1038 - 1043

Honeypots: Approach and Implementation

Kumar Shridhar, Mayank Jain

Share this Article

Downloads: 121

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 562 - 565

Advance Honeypot Mechanism- The Hybrid Solution for Enhancing Computer System Security with DoS

Swapnali Sundar Sadamate, V. S. Nandedkar

Share this Article

Similar Articles with Keyword 'Fog Computing'

Downloads: 112

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1079 - 1082

Information Leak Detection and Prevention

Deepika. S. Patil, Dr. Sujata Terdal

Share this Article

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 6, June 2020

Pages: 901 - 905

Low Latency Placement for Effective Fog based Infrastructure

Dr. Varsha Jotwani

Share this Article

Similar Articles with Keyword 'Cloud'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'Computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article
Top