Augmentation and Orchestration of Security Techniques in Fog Computing
G. Usha1, S. Kannimuthu2, Vinoth N A S3, H. Karthikeyan4

1Dr. G. Usha, Associate Professor, Department of Software Engineering, SRMIST, Anna University Chennai (Tamil Nadu), India.
2Dr. S. Kannimuthu, Associate Professor, Department of Computer Science and Engineering, Karpagam College of Engineering, Coimbatore (Tamil Nadu), India.
3Mr. Vinoth N A S, Assistant Professor, Department of Software Engineering, Kalasalingam Institute of Technology, Krishnankoil (Tamil Nadu), India.
4Mr. H. Karthikeyan, Ph.D Degree, Department of Computer Science, SRM Institute of Science and Technology, (Tamil Nadu), India.
Manuscript received on 02 July 2019 | Revised Manuscript received on 12 August 2019 | Manuscript Published on 27 August 2019 | PP: 143-148 | Volume-8 Issue-2S4 July 2019 | Retrieval Number: B10250782S419/2019©BEIESP | DOI: 10.35940/ijrte.B1025.0782S419
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The inventions in the field of Cloud computing with mobile devices, cloudlets, Edge computing are sizzling growth of IoT(Internet of Things) devices. The cloud computing technology has its limitation in various attributes such as bandwidth, latency, location awareness, resource constraints etc. In order to overcome these issues, the edge computing, which is known as manipulating the data at the edge of the network. In order to support various integrated features with IoT such as storage, networking, home energy management, augment reality fog computing provides resource access to the network edge of the user. In the user side it is confronted with serious security issues for data security. This article provides the augmentation and orchestration of security issues in fog computing. In this paper, first we check the architecture of fog computing. Then we suggest broad taxonomy of fog architecture with various architectures. Finally, this paper is concluded with scope and future research in fog computing.
Keywords: Fog Architecture, Access, Control, Cryptography Authentication.
Scope of the Article: Autonomic Computing