Published on: May 2026
FOG COMPUTING : HIGH LEVEL SECURITY SYSTEM TO BANKING SYSTEM
Harshad Rashtrapal Gedam Sherya Dhoke
Prof. Rohan B. Kokate
J D College of Engineering and Management Khandala Borgaon Phata Kalmeshwar road Nagpur
Article Status
Available Documents
Abstract
mislead attackers. Encryption techniques such as AES and RSA are also used to ensure secure communication. The proposed system improves cloud security by preventing unauthorized access and protecting sensitive data.
How to Cite this Paper
Gedam, H. R. & Dhoke, S. (2026). Fog Computing : High Level Security System to Banking System. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(05). https://doi.org/10.55041/ijcope.v2i5.055
Gedam, Harshad, and Sherya Dhoke. "Fog Computing : High Level Security System to Banking System." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i5.055.
Gedam, Harshad, and Sherya Dhoke. "Fog Computing : High Level Security System to Banking System." International Journal of Creative and Open Research in Engineering and Management 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i5.055.
References
[1] Hashizume et , “Security Issues in Cloud Computing,” 2013[2] Stolfo et , “Fog Computing Security,” IEEE, 2012
[3] Cloud Security Alliance Reports
[4] Madsen et , “Fog Computing Reliability,” 2013
[5] Guan et , “Data Security in Fog Computing,” IEEE, 2018.
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: May 04 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

