ISSN No:2250-3676 ----- Crossref DOI Prefix: 10.64771
   Email: ijesatj@gmail.com,   

Scholarly Peer Reviewed and Fully Referred Open Access Multidisciplinary Monthly Research Journal


    ANALYSIS OF SECURITY ACCESS CONTROL SYSTEMS IN FOG COMPUTING ENVIRONMENT

    G. KARAN CHANDRA,D. SHIVASUNU,K. RAJ KUMAR,P. JENNY SATWIK,Dr. J. PRAVEEN KUMAR

    Author

    ID: 1574

    DOI:

    Abstract :

    Fog Computing Has Emerged As A Transformative Paradigm In Distributed Computing, Enabling Data Processing, Storage, And Decision-making To Occur Closer To The Data Source. This Shift From Centralized Cloud Models To Decentralized Edge Systems Brings Notable Advantages In Terms Of Reduced Latency, Improved Bandwidth Utilization, And Enhanced Responsiveness. However, The Proximity Of Fog Nodes To End Users Introduces New Challenges Related To Security And Access Control, Particularly In Safeguarding Data And Ensuring That Only Authorized Users Can Access Or Manipulate Resources. This Project Presents A Comprehensive Analysis And Practical Implementation Of Security Access Control Mechanisms Within A Fog Computing Environment. The System Is Designed To Enforce Strict User Authentication, Secure Session Management, And Controlled Access To Data Stored At The Fog Layer. It Utilizes A Web-based Interface Supported By A Lightweight Server Framework And A Scalable Object Storage Backend To Enable File Upload, Download, Preview, And Deletion Operations. Access To These Services Is Tightly Regulated Through Robust Authentication Protocols And Encrypted Credential Storage. The Implementation Emphasizes Best Practices In Cybersecurity, Including Strong Password Enforcement, Data Isolation, And The Use Of Cryptographic Hashing For Sensitive Information. By Eliminating The Need To Transmit All Data To A Centralized Cloud, The System Minimizes The Attack Surface And Supports Privacy-preserving Operations At The Network Edge. The Analysis Demonstrates That With Properly Designed Access Control Systems, Fog Computing Environments Can Provide Secure, Efficient, And Scalable Alternatives To Traditional Cloud-based Models For Managing User Data And Resources

    Published:

    25-8-2025

    Issue:

    Vol. 25 No. 8 (2025)


    Page Nos:

    370-378


    Section:

    Articles

    License:

    This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

    How to Cite

    G. KARAN CHANDRA,D. SHIVASUNU,K. RAJ KUMAR,P. JENNY SATWIK,Dr. J. PRAVEEN KUMAR, ANALYSIS OF SECURITY ACCESS CONTROL SYSTEMS IN FOG COMPUTING ENVIRONMENT , 2025, International Journal of Engineering Sciences and Advanced Technology, 25(8), Page 370-378, ISSN No: 2250-3676.

    DOI: