Work place: Department of Computer Science, Kennesaw State University, Kennesaw, Georgia, USA
E-mail: avishwan@students.kennesaw.edu
Website:
Research Interests: Data Structures and Algorithms, Mathematics of Computing, Models of Computation
Biography
Akhilesh Vishwanath, Graduate Research Assistant at Kennesaw State University, born in India on 10th March 1993. Akhilesh is pursuing his Masters of Science in Computer Science Department at Kennesaw State University, Kennesaw, GA, USA with graduation in May 2016. Akhilesh has done Bachelors of Technology in field of Information Technology at Jawaharlal Nehru Technological University, Hyderabad, India, 2014.
He is currently working as a Graduate Research Assistant in the Department of Graduate Business. He worked as a Student Assistant with role of web developer in the department of CS, Kennesaw State University. He was offered with an employment by Infosys Private Limited- One of the world’s biggest IT Company after his under-graduation. He worked as a web-developer intern at Internfever in his under graduation. After his under graduation he worked as Cloud Administrator for ITPlexus Pvt Ltd. He had presented various papers on Internet of Things and Fog Computing in Graduation seminars. His research interests are Internet of Things, Big Data, Cloud Computing and Mobile Computing.
By Akhilesh Vishwanath Ramya Peruri Jing Selena
DOI: https://doi.org/10.5815/ijitcs.2016.05.03, Pub. Date: 8 May 2016
Cloud computing is considered as one of the most exciting technology because of its flexibility and scalability. The main problem that occurs in cloud is security. To overcome the problems or issues of security, a new technique called fog-computing is evolved. As there are security issues in fog even after getting the encrypted data from cloud, we implemented the process of encryption using AES algorithm to check how it works for the fog. So far, to our analysis AES algorithm is the most secured process of encryption for security. Three datasets of different types are considered and applied the analysed encryption technique over those datasets. On validation, entire data over datasets is being accurately encrypted and decrypted back as well. We took android mobile as an edge device and deployed the encryption over datasets into it. Further, performance of encryption is evaluated over selected datasets for accuracy if the entire data is correctly encrypted and decrypted along with the time, User load, Response time, Memory Utilization over file size. Further best and worst cases among the datasets are analysed thereby evaluating the suitability of AES in fog.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals