IJCOPE Journal

UGC Logo DOI / ISO Logo

International Journal of Creative and Open Research in Engineering and Management

A Peer-Reviewed, Open-Access International Journal Supporting Multidisciplinary Research, Digital Publishing Standards, DOI Registration, and Academic Indexing.
Journal Information
ISSN: 3108-1754 (Online)
Crossref DOI: Available
ISO Certification: 9001:2015
Publication Fee: 599/- INR
Compliance: UGC Journal Norms
License: CC BY 4.0
Peer Review: Double Blind
Volume 02, Issue 05

Published on: May 2026

FOG COMPUTING : HIGH LEVEL SECURITY SYSTEM TO BANKING SYSTEM

Harshad Rashtrapal Gedam Sherya Dhoke

Prof. Rohan B. Kokate

Department of Master of Computer Application

J D College of Engineering and Management Khandala Borgaon Phata Kalmeshwar road Nagpur

Article Status

Plagiarism Passed Peer Reviewed Open Access

Available Documents

Abstract

Cloud computing provides flexible and scalable services but suffers from several security challenges such as unauthorized access, data breaches, and insider attacks. This paper proposes a high-level security system using fog computing to enhance data protection. The system integrates user behavior profiling and decoy information technology to detect abnormal activities and

mislead attackers. Encryption techniques such as AES and RSA are also used to ensure secure communication. The proposed system improves cloud security by preventing unauthorized access and protecting sensitive data.

How to Cite this Paper

Gedam, H. R. & Dhoke, S. (2026). Fog Computing : High Level Security System to Banking System. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(05). https://doi.org/10.55041/ijcope.v2i5.055

Gedam, Harshad, and Sherya Dhoke. "Fog Computing : High Level Security System to Banking System." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i5.055.

Gedam, Harshad, and Sherya Dhoke. "Fog Computing : High Level Security System to Banking System." International Journal of Creative and Open Research in Engineering and Management 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i5.055.

Search & Index

References

[1] Hashizume et , “Security Issues in Cloud Computing,” 2013

[2] Stolfo et , “Fog Computing Security,” IEEE, 2012

[3] Cloud Security Alliance Reports

[4] Madsen et , “Fog Computing Reliability,” 2013

[5] Guan et , “Data Security in Fog Computing,” IEEE, 2018.

Ethical Compliance & Review Process

  • All submissions are screened under plagiarism detection.
  • Review follows editorial policy.
  • Authors retain copyright.
  • Peer Review Type: Double-Blind Peer Review
  • Published on: May 04 2026
CCBYNC

This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

View License
Scroll to Top