Information Security Through Fog Computing Using Data Mining Essay

1434 WordsOct 27, 20156 Pages
Information Security Through Fog Computing Using Data Mining Author Name:Saniksha Bhusappa Department:computer Engineering Collage: MITAOE,Alandi,Pune Email: bhusappasaniksha@gmail.com Author Name:Anand Moon Department:computer Engineering Collage: MITAOE,Alandi,Pune Email: anandmoon555@gmail.com Author Name:Kalyani Gagare Department:computer Engineering Collage: MITAOE,Alandi,Pune Email: KALYANIgagare@gmail.com Author Name:Subhash Kursunge Department:computer Engineering Collage: MITAOE,Alandi,Pune Email:subhashkursunge1992@gmail.com Abstract—In today 's world, the small as well as big organizations are using different technology to protect their data and to use the database as and when they need. As we know that the traditional database system are usually deployed in closed environment where user can access the system only through a restricted network or internet. With the fast growth of WWW, user can access virtually any database for which they have proper access right from anywhere in the world. But this comfortness comes with certain type of risk like security and privacy. To overcome this problem, we are introducing a new technique called as fog computing. . Keywords— Fog Computing, Data Mining, Naive Bayes Algorithm 1. INTRODUCTION Fog computing is simillar to cloud. Fog provides data, storage, compute and applications to the end user. Rather than presenting and working from centralized cloud, fog operates on network edge. Because of this, it requires less time to

More about Information Security Through Fog Computing Using Data Mining Essay

Open Document