Profile image
By Alton Parrish (Reporter)
Contributor profile | More stories
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

Is Fog Computing More Secure Than Cloud Computing?

Friday, March 17, 2017 15:17
% of readers think this story is Fact. Add your two cents.

(Before It's News)

Computer scientists in Italy are working on a new concept for remote and distributed storage of documents that could have all the benefits of cloud computing but without the security issues of putting one’s sensitive documents on a single remote server. They describe details in the International Journal of Electronic Security and Digital Forensics.

According to Rosario Culmone and Maria Concetta De Vivo of the University of Camerino, technological and regulatory aspects of cloud computing offer both opportunity and risk. Having one’s files hosted on remote servers displaces the hardware requirements and makes files accessible to remote users more efficiently. However, there are gaps in security and accessibility of files “in the cloud”.

 The team has now turned to another meteorological metaphor – fog – and has proposed an alternative to cloud storage that makes any given file entirely immaterial rather than locating it on a single server. They envisage a fog of files rather than a cloud.

Credit:  Flickr

The files are distributed on a public or private network and and so have no single location, in this way, there is no single server that would be a target for hackers and so only legitimate users can access them. The researchers point out that, “The trend towards outsourcing of services and data on cloud architectures has triggered a number of legal questions on how to manage jurisdiction and who has jurisdiction over data and services in the event of illegal actions.” 

Fog computing would essentially circumvent the security and legal problems putting files off-limits to hackers and beyond the reach of law enforcement and in particular rogue authorities.

“Our proposal is based on this idea of a service which renders information completely immaterial in the sense that for a given period of time there is no place on earth that contains information complete in its entirety,” the team says. 

They explain that the solution is based on a distributed service which we will call “fog” and which uses standard networking protocols in an unconventional way, exploiting “virtual buffers” in internet routers to endlessly relocate data packets without a file ever residing in its entirety on a single computer server. It’s as if you were to send a letter with a tracking device but an incomplete address that simply gets sent from post office to post office and is never delivered.

Contacts and sources:
Inderscience

Citation: Culmone, R. and De Vivo, M.C. (2017) ‘Vanishing files: protocols and regulations for immaterial documents’, Int. J. Electronic Security and Digital Forensics, Vol. 9, No. 1, pp.45-61.



Source: http://www.ineffableisland.com/2017/03/is-fog-computing-more-secure-than-cloud.html

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Top Stories
Recent Stories
 

Featured

 

Top Global

 

Top Alternative

 

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.