Cloud Computing Topic Samples

Cloud Computing Topic Samples 

Info: 590 words Sample Topic Selection
Published: 06th Mar 2023


Tagged: Computer Science & IT

Share this:

Topic 1: " Block Chain Technology in fog computing- A novel improved security approach."

Fog computing is a decentralized computing paradigm that enables several users to share resources, including processing, storage, and cloud platforms. In contrast to cloud computing, fog computing systems prioritize delivering capabilities like location awareness, mobility, and low latency (Kiwelekar, A. W et al. 2021). Integrating blockchain technology and fog computing offers a novel and improved security approach to ensure secure and transparent data processing and storage. Blockchain's decentralized, distributed ledger provides a tamper-proof and immutable record of all transactions, which prevents data from being compromised. Fog computing, which performs data processing and storage closer to the network's edge, enhances the system's by lowering the chance of data breaches, security (Alzoubi, Y. I., et al., 2022).

Moreover, integrating intelligent contracts in blockchain technology enables secure and transparent access control to be managed automatically. Access control policies can be programmed to enforce specific rules, ensuring that only authorized individuals can access data. This approach improves data security, and fog computing ensures access control is managed closer to the network's edge. These tools are employed by various sectors, including transportation, healthcare, and logistics (Singh, S. et al. 2021).

Overall, the combination of blockchain technology and fog computing provides an innovative approach that can improve the security of data processing and storage. Organizations may leverage this approach to enhance their security measures and protect sensitive information as these technologies become more widely adopted.

Topic 2: A research on Fog computing-based intrusion detection approach for effective cybersecurity

Fog computing is a promising approach to improve the security of networks by performing data processing and storage closer to the network's edge. The growing use of IoT devices and the increasing complexity of cyberattacks highlight the importance of effective intrusion detection systems (IDSs). This research focuses on developing a fog computing-based IDS for effective cybersecurity. The data acquisition module collects data from various IoT devices, including sensors and actuators. In addition, the alert module generates alerts when a security threat is detected, allowing timely response to prevent further damage (Labiod, Y. et al.2022).

The approach provides an efficient and scalable solution to improve network security while reducing the impact of cyberattacks. As this model's foundation is a reference architecture, it can resolve any problems that may arise (Singh, S. et al. 2021). Overall, this research highlights the potential of fog computing in improving cybersecurity by developing effective IDSs. Finally, the proposed approach offers a promising solution to address the growing cybersecurity challenges organizations face, especially in the context of IoT devices.

Network defences are frequently disregarded by invasions and assaults using traditional intrusion prevention frameworks. Nevertheless, definitive data collection, retrieval, and cloud intrusion detection approaches require lengthy, expensive, and complicated calculations (Idhammad M. et al., 2018).

Reference:

1. Kiwelekar, A. W., Patil, P., Netak, L. D., & Waikar, S. U. (2021). Blockchain-based security services for fog computing, Fog/Edge Computing for Security, Privacy, and Applications, 271-290.

2. Singh, S., Hosen, A. S., & Yoon, B. (2021). Blockchain security attacks, challenges, and solutions for the future distributed iot network, IEEE Access, 9, 13938-13959.

3. Idhammad, M., Afdel, K., & Belouch, M. (2018), distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Computer Science, 127, 35-41.

4. Alzoubi, Y. I., Al-Ahmad, A., & Kahtan, H. (2022). Blockchain technology as a Fog computing security and privacy solution: An overview, Computer Communications, 182, 129-152.

5. Labiod, Y., Amara Korba, A., & Ghoualmi, N. (2022). Fog computing-based intrusion detection architecture to protect IoT networks, Wireless Personal Communications, 125(1), 231-259.

This will close in 0 seconds