SlideShare a Scribd company logo
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 808 – 811
_______________________________________________________________________________________________
808
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Secure Fog Computing System using Emoticon Technique
Harish Kumar, Sampada Shinde, Pratvina Talele
MIT College of Engineering, Pune
Abstract—Fog computing is a distributed computing infrastructure in whichsome application services are provided at the edge of the network in
smart devices( IoT devices) and some applications are handled in cloud. Fog computing operates on network ends instead of working entirely
from a centralized cloud. It facilitates the operation of storage, compute, analysis and other services between edge devices mostly IoT devices
and cloud computing data centres. The main objective of Fog computing is to process the data close to the edge devices .The problem that occurs
in Fog is confidentiality and security of data . To overcome this problem, we have proposed the Dual-Encryption to data using Emoticon
Technique which is combination of Cryptography and Steganography. In this method, first data is encrypted and then encrypted data is hidden
with the cover text like emoticons. So Dual-Encryption enhances data security and reliability. Even if the covered text is accessed by
unauthorized person, only encrypted data of original data can be viewed not the actual data.
______________________________________________*****____________________________________________
I. INTRODUCTION
Fog computing is a new technology which extends cloud
computing towards the edge of Network [2]. Fog computing
machines provide services with reduced latency and improved
Quality of Service. In cloud computing concept, all the data
produced from the users/edge devices will be directly stored
into the cloud and this data is analysed by warehouses for
analytical purpose. But in fog computing, the users will be
notified about what the actions are needed to be taken on the
data and stored it into the cloud.In the fog computing process,
applications comes to the data not the data to the applications
[1]. Fog computing enables a new set of applications and
services also it acts as an interface between the cloud and the
fog particularly for data management and analytics.
A. Fog Computing
The Fog acts as an interface between edge devices (IoT) and
the cloud which provides necessary extra functionalities for
application-specific processing like filtering, extracting and
aggregation before transmitting the data to the cloud.
Fog computing is a highly virtualized platform that provides
compute, storage, analysis and networking services between
edge devices [2]. Fog computing has lots of advantages like
widespread geographical distribution of data, information
about the physical location of a device to another application or
user, requires less time(low latency), heterogeneity, mobility
support, the predominant role of wireless access, the strong
presence of streaming and real-time applications, the
orchestration of large scale control systems, hierarchical
networking, and computing structures.
Fig. 1.Fog Computing as an interface between edge devices and cloud
B. Fog Engines
Fog-engine provides real time data analytic as well as
facilitates edge devices (IoT) to communicate with each other
and with the cloud. Fog-engine can be modified according to
the application and agile to heterogeneous platform that is
integrated to an IoT device [2]. It allows data processing in the
cloud and in the distributed grid of connected IoT devices
located at the network edge. It expedite for offloading data and
interacting with the cloud as a gateway [2].
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 808 – 811
_______________________________________________________________________________________________
809
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Fig. 2.Fog Engine in Cloud Based Computing System
C. Data Security
In Fog computing, there are many security issues and even the
encryption of data is not safe method [1].Security and privacy
should be maintained in every layer while designing Fog
computing system [3]. Data theft attacks is major issue in fog
computing. If an unauthorized person is an insider then the
chances of data being misused are more. We have to provide
high level of data security in Fog computing system.
II. LITERATURE SURVEY
A. Big Data
Big data refers to the substantial amounts of unstructured,
semi structured or structured data that flows continuously
through and around consortium, including text, video, data
from sensors, and transactional records [2]. Big data analytics
describes the process of performing complex analytical tasks
on data that typically includes grouping, aggregation, or
iterative processes [2].Data which is generated from Internet of
Things or edge devices will grow exponentially as the number
of connected nodes increases.
Figure.3 provides an overview of a flow of data analytics in
Fog engine. The first step is to perform collection of data from
edge devices or Internet of Things. Data cleaning is the next
step which is used to reduce the data size by removing
redundant information which enhances data analytics and
processing speed. Data cleaning also detects and corrects errors
and any inconsistencies from data to improve its quality of
service[2].Data is analysed depending upon users request or
query and based on the results many decisions or interpretation
could be performed.
Fig. 3.Big Data Analytics in Fog Computing System
In Fog computing system, instead of sending all data received
from edge devices or IoT to the cloud, only summarized result
of a data is sent to the cloud. Fog engine receives all the data
from edge devices or IoT, and it is responsible for performing
local data analytics near the data source itself rather than
sending it to cloud. Fog engine performs all the major
functions of Big data. As the data is pre-processed, filtered and
cleaned in the Fog engine itself before offloading the data to
the cloud, the amount of data which is being carried is lower
than the data produced by edge devices or IoT’s. Fog engines
provides a very limiting enumerating power and storage
capacity as compared with cloud but Fog engine offers high
level of fault tolerance and can be integrated with mobile IoT
nodes or edge devices.
B. Problem Statement
Security is one of the major concerns because there are lots of
sensitive data around us. It could be any company pricing
details, or even it could be national secret. All thedata must be
secured and should make sure that it has all necessary methods
in it, which makes an attacker difficult to crack the key. This
paper primarily concentrates on security and privacy of data as
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 808 – 811
_______________________________________________________________________________________________
810
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
key part. In the system of cloud, though secured data is sent to
the fog from cloud, predicting the security threat in the fog
such as man in the middle attacks, we would like to add a
second layer of security within the level of fog.
C. Existing Solution
In fog at present AES encryption algorithm is considered as
an exemplary Advanced Encryption Standard(AES) algorithm
consisting data encryption in first phase and forwarding
corresponding data to fog engine for further analysis in second
while in third phase it offers decryption of encrypted data using
fog engine to get valid data [1].
For encrypting the data AES algorithm requires more
processing time along with complex security overhead. This
algorithm is efficient but does not provide preservation and
complex privacy of data
III. PROPOSED SOLUTION
To avoid the above problem a solution is introduced by
putting forward Emoticons technique where two layer
encryption is provided. In this approach, the emoticons which
are generally used in chats, short message services and
comments, are used as cover media to deliver the data in a
hidden manner [4]. The emoticon is a type of icons or pictorial
representation of text that interprets a user’s perception and
reflex in text mode as shown in Figure. 4. These are popularly
used icons especially where there is a restriction on the number
of characters.
Fig. 4.Emoticons used for Encryption
Initially the data is collected by edge devices. Before
transmitting the data to the Fog Engine, the data is encrypted
using emoticon technique. In first phase, data is encrypted
using Cryptography, where data is transmitted in particular
form. And these encrypted data will be input to second phase
of emoticon technique. In second phase, encrypted data is
hidden behind the cover media that are the emoticons. Again
these emoticons are put into cover text which finally generates
stego text to be transmitted.
The receiver on the other end receives the stego text then
first extracts the emoticons from the cover text and then maps
the meaning of each emoticon to get the encrypted message.
Then the authorized user can decrypt the message using their
own private key to decrypt the message to finally get the actual
data.
Fig. 5.System architecture using Emoticon Technique for
Encryption
IV. ADVANTAGES AND LIMITATIONS
In this technique, first data is Encrypted and then hiding the
encrypted data with the cover text like emoticons makes nearly
impossible to access the data. So, even if the covered media is
accessed by attacker, only encrypted data of original message
can be viewed. Hence by adding encryption to already
encrypted data ensures confidentiality of the communication
and increases reliability.
The only limitation of proposed method is that, it requires
lots of memory since encrypting the data using cover text
(emoticons) requires additional memory.
V. CONCLUSION
This paper focuses on Data Security. We proposed Emoticon
Technique for Encryption of Data in Fog Computing which is a
combination of Cryptography and Steganography which is in
progress. It adds a second layer of data security and provides
high complex security of data.
VI. REFERENCES
[1] Akhilesh Vishwanath, RamyaPeruri, Jing (Selena) He,
"Security in Fog Computing through Encryption",
International Journal of Information Technology and
Computer Science (IJITCS), Vol.8, No.5, pp.28-36, 2016.
DOI: 10.5815/ijitcs.2016.05.03
[2] F. Mehdipour, B. Javadi and A. Mahanti, "FOG-Engine:
Towards Big Data Analytics in the Fog," 2016 IEEE 14th Intl
Conf on Dependable, Autonomic and Secure Computing, 14th
Intl Conf on Pervasive Intelligence and Computing, 2nd Intl
Conf on Big Data Intelligence and Computing and Cyber
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 808 – 811
_______________________________________________________________________________________________
811
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Science and Technology Congress
(DASC/PiCom/DataCom/CyberSciTech), Auckland, 2016,
pp. 640-646.
[3] Yi S., Qin Z., Li Q. (2015) Security and Privacy Issues of Fog
Computing: A Survey. In: Xu K., Zhu H. (eds) Wireless
Algorithms, Systems, and Applications. WASA 2015. Lecture
Notes in Computer Science, vol 9204. Springer, Cham
[4] Miss. Madhura A. Bhoi, Miss. Barkha V. Budhwani, Miss.
Poonam R. Dhayagode, Miss. Tahurafeeza J. Sayyed, Miss.
PratvinaTalele, “Data Hiding using Emoticons”, December
16,Volume 4 Issue 12 , International Journal on Recent and
Innovation Trends in Computing and Communication
(IJRITCC), ISSN: 2321-8169, PP: 54 – 56

More Related Content

PDF
Application of Elliptical Curve Cryptography in Empowering Cloud Data Security
PDF
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
PDF
Architectural design of IoT-cloud computing integration platform
PDF
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
PDF
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
PDF
Internet of things (io t)
PDF
A Smart ITS based Sensor Network for Transport System with Integration of Io...
Application of Elliptical Curve Cryptography in Empowering Cloud Data Security
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
Architectural design of IoT-cloud computing integration platform
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
Internet of things (io t)
A Smart ITS based Sensor Network for Transport System with Integration of Io...

What's hot (20)

PDF
Inventory of IoT slide sets
PDF
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
PDF
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
PDF
Inventory of my IoT slide sets
PDF
IRJET- A Inference Model for Environment Detection using IoT and SVM
PDF
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
PDF
15CS81 Module1 IoT
PDF
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
PDF
Technology analysis for internet of things using big data learning
PDF
Integration of internet of things with wireless sensor network
PDF
Study on Issues in Managing and Protecting Data of IOT
PDF
Analysis of Network Traffic and Security through Log Aggregation
PDF
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
PDF
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
PDF
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
PDF
Data Management for Internet of things : A Survey and Discussion
PDF
Data science
PDF
verifiable and multi-keyword searchable attribute-based encryption scheme for...
PPTX
IOT: The Evolving World of Realtime BigData by Jerry Power
PDF
Implementation of Data Mining Concepts in R Programming
Inventory of IoT slide sets
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
Inventory of my IoT slide sets
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
15CS81 Module1 IoT
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
Technology analysis for internet of things using big data learning
Integration of internet of things with wireless sensor network
Study on Issues in Managing and Protecting Data of IOT
Analysis of Network Traffic and Security through Log Aggregation
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
Data Management for Internet of things : A Survey and Discussion
Data science
verifiable and multi-keyword searchable attribute-based encryption scheme for...
IOT: The Evolving World of Realtime BigData by Jerry Power
Implementation of Data Mining Concepts in R Programming
Ad

Similar to Secure Fog Computing System using Emoticon Technique (20)

PDF
Authentic and Anonymous Data Sharing with Data Partitioning in Big Data
PDF
New Approach to Implement Authentication and Key Distribution on WI-Max Networks
PDF
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
PDF
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
PDF
To Improve Data Storage Security Levels in the Cloud
PDF
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
PDF
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
PDF
A Literature Survey on Internet of Things (IoT)
PDF
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
PDF
Office Automation & Attendance System using IoT
PDF
Office Automation & Attendance System using IoT
PDF
Internet of Things: Definition, Applications, Issues and Future Prospective
PDF
Deep Learning and Big Data technologies for IoT Security
PDF
How Manufacturers Can Unlock Business Value via IoT Analytics
PDF
Fog Computing
PDF
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
PDF
IoT and Fingerprint Based Door Looking System
DOCX
the world of technology is changing at an unprecedented pace, and th.docx
PDF
Review on Multimodal Biometric
PDF
A Brief Review on Internet of Things
Authentic and Anonymous Data Sharing with Data Partitioning in Big Data
New Approach to Implement Authentication and Key Distribution on WI-Max Networks
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
To Improve Data Storage Security Levels in the Cloud
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
A Literature Survey on Internet of Things (IoT)
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
Internet of Things: Definition, Applications, Issues and Future Prospective
Deep Learning and Big Data technologies for IoT Security
How Manufacturers Can Unlock Business Value via IoT Analytics
Fog Computing
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
IoT and Fingerprint Based Door Looking System
the world of technology is changing at an unprecedented pace, and th.docx
Review on Multimodal Biometric
A Brief Review on Internet of Things
Ad

More from rahulmonikasharma (20)

PDF
Data Mining Concepts - A survey paper
PDF
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
PDF
Considering Two Sides of One Review Using Stanford NLP Framework
PDF
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
PDF
Broadcasting Scenario under Different Protocols in MANET: A Survey
PDF
Sybil Attack Analysis and Detection Techniques in MANET
PDF
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
PDF
Quality Determination and Grading of Tomatoes using Raspberry Pi
PDF
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
PDF
DC Conductivity Study of Cadmium Sulfide Nanoparticles
PDF
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
PDF
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
PDF
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
PDF
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
PDF
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
PDF
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
PDF
Short Term Load Forecasting Using ARIMA Technique
PDF
Impact of Coupling Coefficient on Coupled Line Coupler
PDF
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
PDF
Advancement in Abrasive Water Jet Machining - A Study
Data Mining Concepts - A survey paper
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
Considering Two Sides of One Review Using Stanford NLP Framework
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
Broadcasting Scenario under Different Protocols in MANET: A Survey
Sybil Attack Analysis and Detection Techniques in MANET
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
Quality Determination and Grading of Tomatoes using Raspberry Pi
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
DC Conductivity Study of Cadmium Sulfide Nanoparticles
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Short Term Load Forecasting Using ARIMA Technique
Impact of Coupling Coefficient on Coupled Line Coupler
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Advancement in Abrasive Water Jet Machining - A Study

Recently uploaded (20)

PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Well-logging-methods_new................
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Welding lecture in detail for understanding
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Sustainable Sites - Green Building Construction
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
PPT on Performance Review to get promotions
PDF
Digital Logic Computer Design lecture notes
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Geodesy 1.pptx...............................................
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Well-logging-methods_new................
R24 SURVEYING LAB MANUAL for civil enggi
Model Code of Practice - Construction Work - 21102022 .pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Welding lecture in detail for understanding
CYBER-CRIMES AND SECURITY A guide to understanding
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Sustainable Sites - Green Building Construction
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPT on Performance Review to get promotions
Digital Logic Computer Design lecture notes
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Geodesy 1.pptx...............................................
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...

Secure Fog Computing System using Emoticon Technique

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 808 – 811 _______________________________________________________________________________________________ 808 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Secure Fog Computing System using Emoticon Technique Harish Kumar, Sampada Shinde, Pratvina Talele MIT College of Engineering, Pune Abstract—Fog computing is a distributed computing infrastructure in whichsome application services are provided at the edge of the network in smart devices( IoT devices) and some applications are handled in cloud. Fog computing operates on network ends instead of working entirely from a centralized cloud. It facilitates the operation of storage, compute, analysis and other services between edge devices mostly IoT devices and cloud computing data centres. The main objective of Fog computing is to process the data close to the edge devices .The problem that occurs in Fog is confidentiality and security of data . To overcome this problem, we have proposed the Dual-Encryption to data using Emoticon Technique which is combination of Cryptography and Steganography. In this method, first data is encrypted and then encrypted data is hidden with the cover text like emoticons. So Dual-Encryption enhances data security and reliability. Even if the covered text is accessed by unauthorized person, only encrypted data of original data can be viewed not the actual data. ______________________________________________*****____________________________________________ I. INTRODUCTION Fog computing is a new technology which extends cloud computing towards the edge of Network [2]. Fog computing machines provide services with reduced latency and improved Quality of Service. In cloud computing concept, all the data produced from the users/edge devices will be directly stored into the cloud and this data is analysed by warehouses for analytical purpose. But in fog computing, the users will be notified about what the actions are needed to be taken on the data and stored it into the cloud.In the fog computing process, applications comes to the data not the data to the applications [1]. Fog computing enables a new set of applications and services also it acts as an interface between the cloud and the fog particularly for data management and analytics. A. Fog Computing The Fog acts as an interface between edge devices (IoT) and the cloud which provides necessary extra functionalities for application-specific processing like filtering, extracting and aggregation before transmitting the data to the cloud. Fog computing is a highly virtualized platform that provides compute, storage, analysis and networking services between edge devices [2]. Fog computing has lots of advantages like widespread geographical distribution of data, information about the physical location of a device to another application or user, requires less time(low latency), heterogeneity, mobility support, the predominant role of wireless access, the strong presence of streaming and real-time applications, the orchestration of large scale control systems, hierarchical networking, and computing structures. Fig. 1.Fog Computing as an interface between edge devices and cloud B. Fog Engines Fog-engine provides real time data analytic as well as facilitates edge devices (IoT) to communicate with each other and with the cloud. Fog-engine can be modified according to the application and agile to heterogeneous platform that is integrated to an IoT device [2]. It allows data processing in the cloud and in the distributed grid of connected IoT devices located at the network edge. It expedite for offloading data and interacting with the cloud as a gateway [2].
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 808 – 811 _______________________________________________________________________________________________ 809 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Fig. 2.Fog Engine in Cloud Based Computing System C. Data Security In Fog computing, there are many security issues and even the encryption of data is not safe method [1].Security and privacy should be maintained in every layer while designing Fog computing system [3]. Data theft attacks is major issue in fog computing. If an unauthorized person is an insider then the chances of data being misused are more. We have to provide high level of data security in Fog computing system. II. LITERATURE SURVEY A. Big Data Big data refers to the substantial amounts of unstructured, semi structured or structured data that flows continuously through and around consortium, including text, video, data from sensors, and transactional records [2]. Big data analytics describes the process of performing complex analytical tasks on data that typically includes grouping, aggregation, or iterative processes [2].Data which is generated from Internet of Things or edge devices will grow exponentially as the number of connected nodes increases. Figure.3 provides an overview of a flow of data analytics in Fog engine. The first step is to perform collection of data from edge devices or Internet of Things. Data cleaning is the next step which is used to reduce the data size by removing redundant information which enhances data analytics and processing speed. Data cleaning also detects and corrects errors and any inconsistencies from data to improve its quality of service[2].Data is analysed depending upon users request or query and based on the results many decisions or interpretation could be performed. Fig. 3.Big Data Analytics in Fog Computing System In Fog computing system, instead of sending all data received from edge devices or IoT to the cloud, only summarized result of a data is sent to the cloud. Fog engine receives all the data from edge devices or IoT, and it is responsible for performing local data analytics near the data source itself rather than sending it to cloud. Fog engine performs all the major functions of Big data. As the data is pre-processed, filtered and cleaned in the Fog engine itself before offloading the data to the cloud, the amount of data which is being carried is lower than the data produced by edge devices or IoT’s. Fog engines provides a very limiting enumerating power and storage capacity as compared with cloud but Fog engine offers high level of fault tolerance and can be integrated with mobile IoT nodes or edge devices. B. Problem Statement Security is one of the major concerns because there are lots of sensitive data around us. It could be any company pricing details, or even it could be national secret. All thedata must be secured and should make sure that it has all necessary methods in it, which makes an attacker difficult to crack the key. This paper primarily concentrates on security and privacy of data as
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 808 – 811 _______________________________________________________________________________________________ 810 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ key part. In the system of cloud, though secured data is sent to the fog from cloud, predicting the security threat in the fog such as man in the middle attacks, we would like to add a second layer of security within the level of fog. C. Existing Solution In fog at present AES encryption algorithm is considered as an exemplary Advanced Encryption Standard(AES) algorithm consisting data encryption in first phase and forwarding corresponding data to fog engine for further analysis in second while in third phase it offers decryption of encrypted data using fog engine to get valid data [1]. For encrypting the data AES algorithm requires more processing time along with complex security overhead. This algorithm is efficient but does not provide preservation and complex privacy of data III. PROPOSED SOLUTION To avoid the above problem a solution is introduced by putting forward Emoticons technique where two layer encryption is provided. In this approach, the emoticons which are generally used in chats, short message services and comments, are used as cover media to deliver the data in a hidden manner [4]. The emoticon is a type of icons or pictorial representation of text that interprets a user’s perception and reflex in text mode as shown in Figure. 4. These are popularly used icons especially where there is a restriction on the number of characters. Fig. 4.Emoticons used for Encryption Initially the data is collected by edge devices. Before transmitting the data to the Fog Engine, the data is encrypted using emoticon technique. In first phase, data is encrypted using Cryptography, where data is transmitted in particular form. And these encrypted data will be input to second phase of emoticon technique. In second phase, encrypted data is hidden behind the cover media that are the emoticons. Again these emoticons are put into cover text which finally generates stego text to be transmitted. The receiver on the other end receives the stego text then first extracts the emoticons from the cover text and then maps the meaning of each emoticon to get the encrypted message. Then the authorized user can decrypt the message using their own private key to decrypt the message to finally get the actual data. Fig. 5.System architecture using Emoticon Technique for Encryption IV. ADVANTAGES AND LIMITATIONS In this technique, first data is Encrypted and then hiding the encrypted data with the cover text like emoticons makes nearly impossible to access the data. So, even if the covered media is accessed by attacker, only encrypted data of original message can be viewed. Hence by adding encryption to already encrypted data ensures confidentiality of the communication and increases reliability. The only limitation of proposed method is that, it requires lots of memory since encrypting the data using cover text (emoticons) requires additional memory. V. CONCLUSION This paper focuses on Data Security. We proposed Emoticon Technique for Encryption of Data in Fog Computing which is a combination of Cryptography and Steganography which is in progress. It adds a second layer of data security and provides high complex security of data. VI. REFERENCES [1] Akhilesh Vishwanath, RamyaPeruri, Jing (Selena) He, "Security in Fog Computing through Encryption", International Journal of Information Technology and Computer Science (IJITCS), Vol.8, No.5, pp.28-36, 2016. DOI: 10.5815/ijitcs.2016.05.03 [2] F. Mehdipour, B. Javadi and A. Mahanti, "FOG-Engine: Towards Big Data Analytics in the Fog," 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 808 – 811 _______________________________________________________________________________________________ 811 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Auckland, 2016, pp. 640-646. [3] Yi S., Qin Z., Li Q. (2015) Security and Privacy Issues of Fog Computing: A Survey. In: Xu K., Zhu H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science, vol 9204. Springer, Cham [4] Miss. Madhura A. Bhoi, Miss. Barkha V. Budhwani, Miss. Poonam R. Dhayagode, Miss. Tahurafeeza J. Sayyed, Miss. PratvinaTalele, “Data Hiding using Emoticons”, December 16,Volume 4 Issue 12 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 54 – 56