Fog Computing: A Comprehensive Architectural Survey
Main Article Content
Abstract
The development of cloud computing technology with the explosive growth of unstructured data, cloud storage technology is gaining more and more attention. And leave the clouds; and the cloud provider does not have the suggestions for storing data in the cloud, they said, one way or another, and globally. The protection of the secrecy of the arts relies for the most part on the fact that encryption technology. This can be for many reasons, not evidence, on the side of keeping the cloud secret. Our cloud-based, three-layer storage framework. The proposed one it may take most familiar and storage, save the popular datas. Here we are using data to divide the hash-Solomon code algorithm is designed for different parts. The first part received the knowledge, if the knowledge is lacking, we have lost. In the real world from the human point of view of which we are the algorithms secure the data and use the knowledge and assurance of a bucket, and in accordance with what has been designed by the effective cause cannot be in the reason. In addition, according to the computational intelligence algorithm that can calculate distribution clouds, Software as a Service (SaaS): the customer rejected their request in the accessible hosting environment via the network from various clients via application users.
Article Details
All articles published in NVEO are licensed under Copyright Creative Commons Attribution-NonCommercial 4.0 International License.