Document Type : Primary Research paper
Research Supervisor, Assistant Professor, Department of Computer Science, Government Arts College (Affiliated to Bharathidasan University, Trichy-24), Tiruchirappalli-620022, Tamil Nadu, India.
Assistant Professor, Department of Computer Science, Government Arts College (Affiliated to Bharathidasan University, Trichy-24), Tiruchirappalli-620022, Trichy, Tamil Nadu, India.
Over the recent decade, data processing transferred from cloud computing to the local processing environment named Fog computing. Fog computing is an extension of cloud computing, which process data nearby device instead of sending to the cloud this will reduce the burden from the Internet and quick processing.. In spite of the wide utilization of cloud computing, some applications and services still cannot benefit from this popular computing model due to innately problems of cloud computing such as undesirable latency, lack of mobility support and location awareness. As a result, Fog Computing is currently entice many researchers as it brings cloud services closer to the end users. The Internet of Things (lOT), current digitized intelligent connectivity domain, demands real time response in many applications and services. This furnish Fog Computing a suitable platform for achieving goals of autonomy and efficiency. Fog computing is still emit paradigm that demands further research. Among all the other issues customary in fog computing, security is the one of the blazing issues. The fog, existence closer to the end user, is more vulnerable than the cloud. The Biometric cryptography key is used to secure the scrambled data in the fog environment. The Biometric cryptography technique uses fingerprint, voice or iris as a key factor to secure the data encryption and decryption in the cloud server. Advanced biometrics are used to safeguard sensitive documents and valuables. A more instantaneous problem is that databases of personal information are targets for hackers. Biometric technology offers very constrain solutions for security. In the face of risks, the systems are convenient and hard to duplicate. Additionally, these systems will continue to develop for a very long time into the future.