Fog Computing: A Comprehensive Architectural Survey

Main Article Content

Dr.M. Saravanan

Abstract

The development of cloud computing technology with the explosive growth of unstructured data, cloud storage technology is gaining more and more attention. And leave the clouds; and the cloud provider does not have the suggestions for storing data in the cloud, they said, one way or another, and globally. The protection of the secrecy of the arts relies for the most part on the fact that encryption technology. This can be for many reasons, not evidence, on the side of keeping the cloud secret. Our cloud-based, three-layer storage framework. The proposed one  it may take most familiar and  storage, save the popular datas. Here we are using data to divide the hash-Solomon code algorithm is designed for different parts. The first part received the knowledge, if the knowledge is lacking, we have lost. In the real world from the human point of view of which we are the algorithms secure the data and use the knowledge and assurance of a bucket, and in accordance with what has been designed by the effective cause cannot be in the reason. In addition, according to the computational intelligence algorithm that can calculate distribution clouds, Software as a Service (SaaS): the customer rejected their request in the accessible hosting environment via the network from various clients via application users.

Article Details

Section
Articles