Fog Based Three-Layer Architecture for Privacy Preserving
Ashwini Jilla1, K. C. Sreedhar2

1Ashwini Jilla*, Department of Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Hyderabad, India.
2Mr.K.C.Sreedhar , Asst Professor Department of Computer Science and Engineering, Sreenidhi Institute of Science and technology, Yamnampet, Ghatkersar, Hyderabad, India.

Manuscript received on June 01, 2020. | Revised Manuscript received on June 08, 2020. | Manuscript published on June 30, 2020. | PP: 1082-1085 | Volume-9 Issue-5, June 2020. | Retrieval Number: E1010069520/2020©BEIESP | DOI: 10.35940/ijeat.E1010.069520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Fog computing is one of the most latest technology used by the cloud providers to safe guard the user data and service provider’s data servers. Fog computing acts as mediator between hardware and remote servers or cloud servers. Cloud computing still has the lot of vulnerabilities. Privacy to the users data is main issue in the present cloud computing. Whenever users uploads data into cloud server then user will lose their right on their own data because users don’t know about, what cloud providers do with users data, they can sell the users data for their own profit without knowing to users. Fog computing provides lot of services like operation of computer, storage and networking services between users and cloud computing data centers. With the networking services users can lose their data privacy or leakage without knowing to user. Because public clouds are not secure enough and users doesn’t know where data is storing in cloud servers. Breaking the data into small parts can lead to loss of data and which it can create way to attackers to steal data. Even data might be changed instated of one data with another. Intelligence can be applied in the fog computing technology to use of computing resources and security reasons. Applying multiple layers of security features by using kubernets can improve better service to user and user’s data can be safe from the attackers. Whenever user lost connection with the server kubernets establishes reconnection between user and server. RSA256 encryption is applied to users data with this we can provide better security between cloud server and users. 
Keywords: Cloud Computing, RSA, Kubernet, Fog Computing