Proficient approaches for scalability and security in IoT through edge/fog/cloud computing: a survey Online publication date: Tue, 07-Sep-2021
by K. Suresh Kumar; A.S. Radhamani; S. Sundaresan
International Journal of Data Science (IJDS), Vol. 6, No. 1, 2021
Abstract: Cloud computing has evolved to the extent of 5G and the Internet of Things (IoT). For data warehousing, cloud computing paves an essential role in processing and implementation. The security-related issues are identified when the information is stored in the cloud. Be involved in sorting and in preparing the data for data warehousing. Until information is encrypted, security questions are raised. Therefore, it has been determined that the cloud-accessible data is essentially unexploitable because of limitations such as bandwidth restrictions, inactivity, inadequate resources, and various security problems. Fog computing and edge computing are other means of resolving these types of problems. In this paper, the IoT secrecy is analysed using it along with edge/cloud/fog computing. The various algorithms used, objectives, the proposed methodologies and their advantages are discussed in this paper. This paper paves the way to an integrated system in which scalability and security are enhanced.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Data Science (IJDS):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com