Secure and Privacy Obfuscation for Fog Enabled IoT Services


Secure and Privacy Obfuscation for Fog Enabled IoT Services

Chandramohan

Chandramohan "Secure and Privacy Obfuscation for Fog Enabled IoT Services" Published in International Journal of Trend in Research and Development (IJTRD), ISSN: 2394-9333, Conference Proceeding | NCMCR-19 , March 2019, URL: http://www.ijtrd.com/papers/IJTRD20466.pdf

Fog enabled IoT services share similarities with the data stream processing scenario in which stream produces several data in real time and stream gathers these data. Data encryption and standard access control models such as role based access control, it have been used to secure data stream processing. System Architecture of fog computing enables system users and it might have any personal device such as a laptop or a smart phone to contact the fog computing system and request the execution of a certain service.

Fog computing, Edge Computing, IoT, Cloud Computing, Privacy, Security.


Conference Proceeding | NCMCR-19 , March 2019

2394-9333

IJTRD20466
pompy wtryskowe|cheap huarache shoes| cheap jordans|cheap jordans|cheap air max| cheap sneaker cheap nfl jerseys|cheap air jordanscheap jordan shoes
cheap wholesale jordans