Abstract :Fog Computing Has Emerged As A Transformative Paradigm In Distributed Computing, Enabling Data Processing, Storage, And Decision-making To Occur Closer To The Data Source. This Shift From Centralized Cloud Models To Decentralized Edge Systems Brings Notable Advantages In Terms Of Reduced Latency, Improved Bandwidth Utilization, And Enhanced Responsiveness. However, The Proximity Of Fog Nodes To End Users Introduces New Challenges Related To Security And Access Control, Particularly In Safeguarding Data And Ensuring That Only Authorized Users Can Access Or Manipulate Resources. This Project Presents A Comprehensive Analysis And Practical Implementation Of Security Access Control Mechanisms Within A Fog Computing Environment. The System Is Designed To Enforce Strict User Authentication, Secure Session Management, And Controlled Access To Data Stored At The Fog Layer. It Utilizes A Web-based Interface Supported By A Lightweight Server Framework And A Scalable Object Storage Backend To Enable File Upload, Download, Preview, And Deletion Operations. Access To These Services Is Tightly Regulated Through Robust Authentication Protocols And Encrypted Credential Storage. The Implementation Emphasizes Best Practices In Cybersecurity, Including Strong Password Enforcement, Data Isolation, And The Use Of Cryptographic Hashing For Sensitive Information. By Eliminating The Need To Transmit All Data To A Centralized Cloud, The System Minimizes The Attack Surface And Supports Privacy-preserving Operations At The Network Edge. The Analysis Demonstrates That With Properly Designed Access Control Systems, Fog Computing Environments Can Provide Secure, Efficient, And Scalable Alternatives To Traditional Cloud-based Models For Managing User Data And Resources |
Published:25-8-2025 Issue:Vol. 25 No. 8 (2025) Page Nos:370-378 Section:Articles License:This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. How to Cite |