Loading

Integration of Fog and IoT with Multiensor Data Gathering
S. Muthuselvan1, S. Rajaprakash2, K. Karthik3, Prasanna4, vidhiyadharan C.J5
1S. Muthuselvan, Department of Computer Science and Engineering, Aarupadaiveedu Institute of Technology, Vinayaka Missions Research Foundation  Chennai, India.
2S. Rajaprakash, Department of Computer Science and Engineering, Aarupadaiveedu Institute of Technology, Vinayaka Missions Research Foundation, Chennai, India.
3K. Karthik, Department of Computer Science and Engineering, Aarupadaiveedu Institute of Technology, Vinayaka Missions Research Foundation, Chennai, India.
4Prasanna, Department of Computer Science and Engineering, Aarupadaiveedu Institute of Technology, Vinayaka Missions Research Foundation, Chennai, India.
5Vidhiyadharan C.J, Department of Computer Science and Engineering, Aarupadaiveedu Institute of Technology, Vinayaka Missions Research Foundation, Chennai, India.

Manuscript received on November 17., 2019. | Revised Manuscript received on November 24 2019. | Manuscript published on 30 November, 2019. | PP: 11785-11787 | Volume-8 Issue-4, November 2019. | Retrieval Number: D9042118419/2019©BEIESP | DOI: 10.35940/ijrte.D9042.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the already existing system number of internet connected devices rapidly increase, this increased demand real-time, for the standard cloud computing framework, low latency services proving to be always a challenge. While In the proposed System, fog computing paradigm serves the demands of the latency sensitive applications in the context of IOT. The IOT is rely on cloud computing by passing information about sensor. This is a decentralized process to gather the information from each and every region of the city. System will check the energy and location of every server. Because whenever server uploads the sensor details it can degrade their energy on every time. So we have to migrate the data by allocating another server which contains the energy to send.
Keywords: Database, Insider Attacks, Anomaly Detection, Application Profile, SQL Injection.
Scope of the Article: Database Theory and Application.