The use of different cloud computing technologies increased with the rise of 5G technology and IoT. Cloud computing also enabled intense data processing and warehousing. Data storage in the cloud comes with several issues and security concerns. Moreover, when the volume of data created by every device increases, the conventional cloud computing architecture fails to address concerns such as excessive latency, bandwidth limits, and resource constraints. As a result, new computational paradigms such as edge and fog computing have been proposed to address the former's issues. Both of these paradigms offer computation and memory storage alternatives. Regardless of their benefits, implementing these technologies introduces many new privacy and security issues. This work presents a list of security and privacy concerns, as well as dangers, that exist in all three computing paradigms: cloud, fog, and edge computing. Keywords: Fog Computing, Cloud Computing, Edge Computing Security and privacy issues, Attacks
Visual cryptography (VC) is a secret sharing cryptographic technique, which permits visual information that is encrypted in such a way that the decrypted information shows the visual image. Security is the common problem that arises in the general VC technique. To secure the visual information, an effective method is proposed using a developed sailfish invasive weed optimization (SIWO) algorithm. At first, the grayscale image is shared with multiple parties, and here the shared images are encrypted and decrypted to reconstruct the original image back. The key generation is done using the developed SIWO-based data sharing approach. Here, the developed approach offered the peak signal-to-noise ratiof 34.870 and 33.711 dB for Lena and Cameraman images, respectively, and it attains better performance in terms of secret image sharing.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.