SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 808 โ€“ 811
_______________________________________________________________________________________________
808
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Secure Fog Computing System using Emoticon Technique
Harish Kumar, Sampada Shinde, Pratvina Talele
MIT College of Engineering, Pune
Abstractโ€”Fog computing is a distributed computing infrastructure in whichsome application services are provided at the edge of the network in
smart devices( IoT devices) and some applications are handled in cloud. Fog computing operates on network ends instead of working entirely
from a centralized cloud. It facilitates the operation of storage, compute, analysis and other services between edge devices mostly IoT devices
and cloud computing data centres. The main objective of Fog computing is to process the data close to the edge devices .The problem that occurs
in Fog is confidentiality and security of data . To overcome this problem, we have proposed the Dual-Encryption to data using Emoticon
Technique which is combination of Cryptography and Steganography. In this method, first data is encrypted and then encrypted data is hidden
with the cover text like emoticons. So Dual-Encryption enhances data security and reliability. Even if the covered text is accessed by
unauthorized person, only encrypted data of original data can be viewed not the actual data.
______________________________________________*****____________________________________________
I. INTRODUCTION
Fog computing is a new technology which extends cloud
computing towards the edge of Network [2]. Fog computing
machines provide services with reduced latency and improved
Quality of Service. In cloud computing concept, all the data
produced from the users/edge devices will be directly stored
into the cloud and this data is analysed by warehouses for
analytical purpose. But in fog computing, the users will be
notified about what the actions are needed to be taken on the
data and stored it into the cloud.In the fog computing process,
applications comes to the data not the data to the applications
[1]. Fog computing enables a new set of applications and
services also it acts as an interface between the cloud and the
fog particularly for data management and analytics.
A. Fog Computing
The Fog acts as an interface between edge devices (IoT) and
the cloud which provides necessary extra functionalities for
application-specific processing like filtering, extracting and
aggregation before transmitting the data to the cloud.
Fog computing is a highly virtualized platform that provides
compute, storage, analysis and networking services between
edge devices [2]. Fog computing has lots of advantages like
widespread geographical distribution of data, information
about the physical location of a device to another application or
user, requires less time(low latency), heterogeneity, mobility
support, the predominant role of wireless access, the strong
presence of streaming and real-time applications, the
orchestration of large scale control systems, hierarchical
networking, and computing structures.
Fig. 1.Fog Computing as an interface between edge devices and cloud
B. Fog Engines
Fog-engine provides real time data analytic as well as
facilitates edge devices (IoT) to communicate with each other
and with the cloud. Fog-engine can be modified according to
the application and agile to heterogeneous platform that is
integrated to an IoT device [2]. It allows data processing in the
cloud and in the distributed grid of connected IoT devices
located at the network edge. It expedite for offloading data and
interacting with the cloud as a gateway [2].
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 808 โ€“ 811
_______________________________________________________________________________________________
809
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Fig. 2.Fog Engine in Cloud Based Computing System
C. Data Security
In Fog computing, there are many security issues and even the
encryption of data is not safe method [1].Security and privacy
should be maintained in every layer while designing Fog
computing system [3]. Data theft attacks is major issue in fog
computing. If an unauthorized person is an insider then the
chances of data being misused are more. We have to provide
high level of data security in Fog computing system.
II. LITERATURE SURVEY
A. Big Data
Big data refers to the substantial amounts of unstructured,
semi structured or structured data that flows continuously
through and around consortium, including text, video, data
from sensors, and transactional records [2]. Big data analytics
describes the process of performing complex analytical tasks
on data that typically includes grouping, aggregation, or
iterative processes [2].Data which is generated from Internet of
Things or edge devices will grow exponentially as the number
of connected nodes increases.
Figure.3 provides an overview of a flow of data analytics in
Fog engine. The first step is to perform collection of data from
edge devices or Internet of Things. Data cleaning is the next
step which is used to reduce the data size by removing
redundant information which enhances data analytics and
processing speed. Data cleaning also detects and corrects errors
and any inconsistencies from data to improve its quality of
service[2].Data is analysed depending upon users request or
query and based on the results many decisions or interpretation
could be performed.
Fig. 3.Big Data Analytics in Fog Computing System
In Fog computing system, instead of sending all data received
from edge devices or IoT to the cloud, only summarized result
of a data is sent to the cloud. Fog engine receives all the data
from edge devices or IoT, and it is responsible for performing
local data analytics near the data source itself rather than
sending it to cloud. Fog engine performs all the major
functions of Big data. As the data is pre-processed, filtered and
cleaned in the Fog engine itself before offloading the data to
the cloud, the amount of data which is being carried is lower
than the data produced by edge devices or IoTโ€™s. Fog engines
provides a very limiting enumerating power and storage
capacity as compared with cloud but Fog engine offers high
level of fault tolerance and can be integrated with mobile IoT
nodes or edge devices.
B. Problem Statement
Security is one of the major concerns because there are lots of
sensitive data around us. It could be any company pricing
details, or even it could be national secret. All thedata must be
secured and should make sure that it has all necessary methods
in it, which makes an attacker difficult to crack the key. This
paper primarily concentrates on security and privacy of data as
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 808 โ€“ 811
_______________________________________________________________________________________________
810
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
key part. In the system of cloud, though secured data is sent to
the fog from cloud, predicting the security threat in the fog
such as man in the middle attacks, we would like to add a
second layer of security within the level of fog.
C. Existing Solution
In fog at present AES encryption algorithm is considered as
an exemplary Advanced Encryption Standard(AES) algorithm
consisting data encryption in first phase and forwarding
corresponding data to fog engine for further analysis in second
while in third phase it offers decryption of encrypted data using
fog engine to get valid data [1].
For encrypting the data AES algorithm requires more
processing time along with complex security overhead. This
algorithm is efficient but does not provide preservation and
complex privacy of data
III. PROPOSED SOLUTION
To avoid the above problem a solution is introduced by
putting forward Emoticons technique where two layer
encryption is provided. In this approach, the emoticons which
are generally used in chats, short message services and
comments, are used as cover media to deliver the data in a
hidden manner [4]. The emoticon is a type of icons or pictorial
representation of text that interprets a userโ€™s perception and
reflex in text mode as shown in Figure. 4. These are popularly
used icons especially where there is a restriction on the number
of characters.
Fig. 4.Emoticons used for Encryption
Initially the data is collected by edge devices. Before
transmitting the data to the Fog Engine, the data is encrypted
using emoticon technique. In first phase, data is encrypted
using Cryptography, where data is transmitted in particular
form. And these encrypted data will be input to second phase
of emoticon technique. In second phase, encrypted data is
hidden behind the cover media that are the emoticons. Again
these emoticons are put into cover text which finally generates
stego text to be transmitted.
The receiver on the other end receives the stego text then
first extracts the emoticons from the cover text and then maps
the meaning of each emoticon to get the encrypted message.
Then the authorized user can decrypt the message using their
own private key to decrypt the message to finally get the actual
data.
Fig. 5.System architecture using Emoticon Technique for
Encryption
IV. ADVANTAGES AND LIMITATIONS
In this technique, first data is Encrypted and then hiding the
encrypted data with the cover text like emoticons makes nearly
impossible to access the data. So, even if the covered media is
accessed by attacker, only encrypted data of original message
can be viewed. Hence by adding encryption to already
encrypted data ensures confidentiality of the communication
and increases reliability.
The only limitation of proposed method is that, it requires
lots of memory since encrypting the data using cover text
(emoticons) requires additional memory.
V. CONCLUSION
This paper focuses on Data Security. We proposed Emoticon
Technique for Encryption of Data in Fog Computing which is a
combination of Cryptography and Steganography which is in
progress. It adds a second layer of data security and provides
high complex security of data.
VI. REFERENCES
[1] Akhilesh Vishwanath, RamyaPeruri, Jing (Selena) He,
"Security in Fog Computing through Encryption",
International Journal of Information Technology and
Computer Science (IJITCS), Vol.8, No.5, pp.28-36, 2016.
DOI: 10.5815/ijitcs.2016.05.03
[2] F. Mehdipour, B. Javadi and A. Mahanti, "FOG-Engine:
Towards Big Data Analytics in the Fog," 2016 IEEE 14th Intl
Conf on Dependable, Autonomic and Secure Computing, 14th
Intl Conf on Pervasive Intelligence and Computing, 2nd Intl
Conf on Big Data Intelligence and Computing and Cyber
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 808 โ€“ 811
_______________________________________________________________________________________________
811
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Science and Technology Congress
(DASC/PiCom/DataCom/CyberSciTech), Auckland, 2016,
pp. 640-646.
[3] Yi S., Qin Z., Li Q. (2015) Security and Privacy Issues of Fog
Computing: A Survey. In: Xu K., Zhu H. (eds) Wireless
Algorithms, Systems, and Applications. WASA 2015. Lecture
Notes in Computer Science, vol 9204. Springer, Cham
[4] Miss. Madhura A. Bhoi, Miss. Barkha V. Budhwani, Miss.
Poonam R. Dhayagode, Miss. Tahurafeeza J. Sayyed, Miss.
PratvinaTalele, โ€œData Hiding using Emoticonsโ€, December
16,Volume 4 Issue 12 , International Journal on Recent and
Innovation Trends in Computing and Communication
(IJRITCC), ISSN: 2321-8169, PP: 54 โ€“ 56

More Related Content

What's hot

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
rahulmonikasharma
ย 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
YogeshIJTSRD
ย 

What's hot (20)

Inventory of IoT slide sets
Inventory of IoT slide setsInventory of IoT slide sets
Inventory of IoT slide sets
ย 
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
ย 
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
ย 
Inventory of my IoT slide sets
Inventory of my IoT slide setsInventory of my IoT slide sets
Inventory of my IoT slide sets
ย 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
ย 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
ย 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
ย 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
ย 
Technology analysis for internet of things using big data learning
Technology analysis for internet of things using big data learningTechnology analysis for internet of things using big data learning
Technology analysis for internet of things using big data learning
ย 
Integration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor networkIntegration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor network
ย 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ย 
Analysis of Network Traffic and Security through Log Aggregation
Analysis of Network Traffic and Security through Log AggregationAnalysis of Network Traffic and Security through Log Aggregation
Analysis of Network Traffic and Security through Log Aggregation
ย 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
ย 
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
ย 
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING  MACHINE LEARNING AND IMAGE MATCHINGTHE LORE OF SPECULATION AND ANALYSIS USING  MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
ย 
Data Management for Internet of things : A Survey and Discussion
Data Management for Internet of things : A Survey and DiscussionData Management for Internet of things : A Survey and Discussion
Data Management for Internet of things : A Survey and Discussion
ย 
Data science
Data scienceData science
Data science
ย 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
ย 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry Power
ย 
Implementation of Data Mining Concepts in R Programming
Implementation of Data Mining Concepts in R ProgrammingImplementation of Data Mining Concepts in R Programming
Implementation of Data Mining Concepts in R Programming
ย 

Similar to Secure Fog Computing System using Emoticon Technique

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
rahulmonikasharma
ย 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Dalton Valadares
ย 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
pelise1
ย 

Similar to Secure Fog Computing System using Emoticon Technique (20)

Authentic and Anonymous Data Sharing with Data Partitioning in Big Data
Authentic and Anonymous Data Sharing with Data Partitioning in Big DataAuthentic and Anonymous Data Sharing with Data Partitioning in Big Data
Authentic and Anonymous Data Sharing with Data Partitioning in Big Data
ย 
New Approach to Implement Authentication and Key Distribution on WI-Max Networks
New Approach to Implement Authentication and Key Distribution on WI-Max NetworksNew Approach to Implement Authentication and Key Distribution on WI-Max Networks
New Approach to Implement Authentication and Key Distribution on WI-Max Networks
ย 
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-201728 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
ย 
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
ย 
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the CloudTo Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloud
ย 
Methods of Data Access in Cloud Computing and Itโ€™s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and Itโ€™s Challenges in Network Secu...Methods of Data Access in Cloud Computing and Itโ€™s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and Itโ€™s Challenges in Network Secu...
ย 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
ย 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
ย 
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
ย 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
ย 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
ย 
Internet of Things: Definition, Applications, Issues and Future Prospective
Internet of Things: Definition, Applications, Issues and Future ProspectiveInternet of Things: Definition, Applications, Issues and Future Prospective
Internet of Things: Definition, Applications, Issues and Future Prospective
ย 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
ย 
How Manufacturers Can Unlock Business Value via IoT Analytics
How Manufacturers Can Unlock Business Value via IoT AnalyticsHow Manufacturers Can Unlock Business Value via IoT Analytics
How Manufacturers Can Unlock Business Value via IoT Analytics
ย 
Fog Computing
Fog ComputingFog Computing
Fog Computing
ย 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
ย 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking System
ย 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
ย 
Review on Multimodal Biometric
Review on Multimodal BiometricReview on Multimodal Biometric
Review on Multimodal Biometric
ย 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
ย 

More from rahulmonikasharma

Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
rahulmonikasharma
ย 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
ย 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
ย 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
ย 
A New Detection and Decoding Technique for (2ร—N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2ร—N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2ร—N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2ร—N_r ) MIMO Communication Systems
ย 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
ย 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
ย 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
ย 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
ย 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
ย 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
ย 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
ย 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
ย 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
ย 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
ย 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
ย 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
ย 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
ย 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
ย 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
ย 
Advancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A StudyAdvancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A Study
ย 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
ย 

Recently uploaded (20)

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
ย 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
ย 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
ย 

Secure Fog Computing System using Emoticon Technique

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 808 โ€“ 811 _______________________________________________________________________________________________ 808 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Secure Fog Computing System using Emoticon Technique Harish Kumar, Sampada Shinde, Pratvina Talele MIT College of Engineering, Pune Abstractโ€”Fog computing is a distributed computing infrastructure in whichsome application services are provided at the edge of the network in smart devices( IoT devices) and some applications are handled in cloud. Fog computing operates on network ends instead of working entirely from a centralized cloud. It facilitates the operation of storage, compute, analysis and other services between edge devices mostly IoT devices and cloud computing data centres. The main objective of Fog computing is to process the data close to the edge devices .The problem that occurs in Fog is confidentiality and security of data . To overcome this problem, we have proposed the Dual-Encryption to data using Emoticon Technique which is combination of Cryptography and Steganography. In this method, first data is encrypted and then encrypted data is hidden with the cover text like emoticons. So Dual-Encryption enhances data security and reliability. Even if the covered text is accessed by unauthorized person, only encrypted data of original data can be viewed not the actual data. ______________________________________________*****____________________________________________ I. INTRODUCTION Fog computing is a new technology which extends cloud computing towards the edge of Network [2]. Fog computing machines provide services with reduced latency and improved Quality of Service. In cloud computing concept, all the data produced from the users/edge devices will be directly stored into the cloud and this data is analysed by warehouses for analytical purpose. But in fog computing, the users will be notified about what the actions are needed to be taken on the data and stored it into the cloud.In the fog computing process, applications comes to the data not the data to the applications [1]. Fog computing enables a new set of applications and services also it acts as an interface between the cloud and the fog particularly for data management and analytics. A. Fog Computing The Fog acts as an interface between edge devices (IoT) and the cloud which provides necessary extra functionalities for application-specific processing like filtering, extracting and aggregation before transmitting the data to the cloud. Fog computing is a highly virtualized platform that provides compute, storage, analysis and networking services between edge devices [2]. Fog computing has lots of advantages like widespread geographical distribution of data, information about the physical location of a device to another application or user, requires less time(low latency), heterogeneity, mobility support, the predominant role of wireless access, the strong presence of streaming and real-time applications, the orchestration of large scale control systems, hierarchical networking, and computing structures. Fig. 1.Fog Computing as an interface between edge devices and cloud B. Fog Engines Fog-engine provides real time data analytic as well as facilitates edge devices (IoT) to communicate with each other and with the cloud. Fog-engine can be modified according to the application and agile to heterogeneous platform that is integrated to an IoT device [2]. It allows data processing in the cloud and in the distributed grid of connected IoT devices located at the network edge. It expedite for offloading data and interacting with the cloud as a gateway [2].
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 808 โ€“ 811 _______________________________________________________________________________________________ 809 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Fig. 2.Fog Engine in Cloud Based Computing System C. Data Security In Fog computing, there are many security issues and even the encryption of data is not safe method [1].Security and privacy should be maintained in every layer while designing Fog computing system [3]. Data theft attacks is major issue in fog computing. If an unauthorized person is an insider then the chances of data being misused are more. We have to provide high level of data security in Fog computing system. II. LITERATURE SURVEY A. Big Data Big data refers to the substantial amounts of unstructured, semi structured or structured data that flows continuously through and around consortium, including text, video, data from sensors, and transactional records [2]. Big data analytics describes the process of performing complex analytical tasks on data that typically includes grouping, aggregation, or iterative processes [2].Data which is generated from Internet of Things or edge devices will grow exponentially as the number of connected nodes increases. Figure.3 provides an overview of a flow of data analytics in Fog engine. The first step is to perform collection of data from edge devices or Internet of Things. Data cleaning is the next step which is used to reduce the data size by removing redundant information which enhances data analytics and processing speed. Data cleaning also detects and corrects errors and any inconsistencies from data to improve its quality of service[2].Data is analysed depending upon users request or query and based on the results many decisions or interpretation could be performed. Fig. 3.Big Data Analytics in Fog Computing System In Fog computing system, instead of sending all data received from edge devices or IoT to the cloud, only summarized result of a data is sent to the cloud. Fog engine receives all the data from edge devices or IoT, and it is responsible for performing local data analytics near the data source itself rather than sending it to cloud. Fog engine performs all the major functions of Big data. As the data is pre-processed, filtered and cleaned in the Fog engine itself before offloading the data to the cloud, the amount of data which is being carried is lower than the data produced by edge devices or IoTโ€™s. Fog engines provides a very limiting enumerating power and storage capacity as compared with cloud but Fog engine offers high level of fault tolerance and can be integrated with mobile IoT nodes or edge devices. B. Problem Statement Security is one of the major concerns because there are lots of sensitive data around us. It could be any company pricing details, or even it could be national secret. All thedata must be secured and should make sure that it has all necessary methods in it, which makes an attacker difficult to crack the key. This paper primarily concentrates on security and privacy of data as
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 808 โ€“ 811 _______________________________________________________________________________________________ 810 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ key part. In the system of cloud, though secured data is sent to the fog from cloud, predicting the security threat in the fog such as man in the middle attacks, we would like to add a second layer of security within the level of fog. C. Existing Solution In fog at present AES encryption algorithm is considered as an exemplary Advanced Encryption Standard(AES) algorithm consisting data encryption in first phase and forwarding corresponding data to fog engine for further analysis in second while in third phase it offers decryption of encrypted data using fog engine to get valid data [1]. For encrypting the data AES algorithm requires more processing time along with complex security overhead. This algorithm is efficient but does not provide preservation and complex privacy of data III. PROPOSED SOLUTION To avoid the above problem a solution is introduced by putting forward Emoticons technique where two layer encryption is provided. In this approach, the emoticons which are generally used in chats, short message services and comments, are used as cover media to deliver the data in a hidden manner [4]. The emoticon is a type of icons or pictorial representation of text that interprets a userโ€™s perception and reflex in text mode as shown in Figure. 4. These are popularly used icons especially where there is a restriction on the number of characters. Fig. 4.Emoticons used for Encryption Initially the data is collected by edge devices. Before transmitting the data to the Fog Engine, the data is encrypted using emoticon technique. In first phase, data is encrypted using Cryptography, where data is transmitted in particular form. And these encrypted data will be input to second phase of emoticon technique. In second phase, encrypted data is hidden behind the cover media that are the emoticons. Again these emoticons are put into cover text which finally generates stego text to be transmitted. The receiver on the other end receives the stego text then first extracts the emoticons from the cover text and then maps the meaning of each emoticon to get the encrypted message. Then the authorized user can decrypt the message using their own private key to decrypt the message to finally get the actual data. Fig. 5.System architecture using Emoticon Technique for Encryption IV. ADVANTAGES AND LIMITATIONS In this technique, first data is Encrypted and then hiding the encrypted data with the cover text like emoticons makes nearly impossible to access the data. So, even if the covered media is accessed by attacker, only encrypted data of original message can be viewed. Hence by adding encryption to already encrypted data ensures confidentiality of the communication and increases reliability. The only limitation of proposed method is that, it requires lots of memory since encrypting the data using cover text (emoticons) requires additional memory. V. CONCLUSION This paper focuses on Data Security. We proposed Emoticon Technique for Encryption of Data in Fog Computing which is a combination of Cryptography and Steganography which is in progress. It adds a second layer of data security and provides high complex security of data. VI. REFERENCES [1] Akhilesh Vishwanath, RamyaPeruri, Jing (Selena) He, "Security in Fog Computing through Encryption", International Journal of Information Technology and Computer Science (IJITCS), Vol.8, No.5, pp.28-36, 2016. DOI: 10.5815/ijitcs.2016.05.03 [2] F. Mehdipour, B. Javadi and A. Mahanti, "FOG-Engine: Towards Big Data Analytics in the Fog," 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 808 โ€“ 811 _______________________________________________________________________________________________ 811 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Auckland, 2016, pp. 640-646. [3] Yi S., Qin Z., Li Q. (2015) Security and Privacy Issues of Fog Computing: A Survey. In: Xu K., Zhu H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science, vol 9204. Springer, Cham [4] Miss. Madhura A. Bhoi, Miss. Barkha V. Budhwani, Miss. Poonam R. Dhayagode, Miss. Tahurafeeza J. Sayyed, Miss. PratvinaTalele, โ€œData Hiding using Emoticonsโ€, December 16,Volume 4 Issue 12 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 54 โ€“ 56