2020
DOI: 10.30534/ijatcse/2020/37912020
|View full text |Cite
|
Sign up to set email alerts
|

Security of Data Access in Fog Computing using Location-based Authentication

Abstract: Many organizations, such as military, financial, and banking organizations, implement strict security policies for securing and protecting data from any possible attack. Moreover, these institutions use the Internet of things (IoT) and fog computing for communication and storage that require new solutions to confirming the login process between the two techniques. A methodology for increasing the security for fog computing is proposed in this research. The proposed methodology provides authentication that is b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 11 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?