Enhancing Higher Education Security Through Fog/Edge Computing: A Novel Approach
Krunal Suthar1, Mitul Patel2, Yogesh Patel3, Bhavesh Patel4, Hiral Patel5

1Suthar Krunal, Department of Computer Engineering, Computer Engineering, Patan (Gujarat) India.

2Mitul Patel, Department of Computer Engineering, Computer Engineering, Patan (Gujarat) India.

3Yogesh Patel, Department of Computer Engineering, Computer Engineering, Patan (Gujarat) India.

4Bhavesh Patel, Department of Computer Engineering, Computer Engineering, Patan (Gujarat) India.

5Hiral Patel, Department of Computer Engineering, Sal Institute, Ahmedabad, (Gujarat) India.  

Manuscript received on 02 January 2024 | Revised Manuscript received on 12 January 2024 | Manuscript Accepted on 15 January 2024 | Manuscript published on 30 January 2024 | PP: 16-20 | Volume-13 Issue-6, January 2024 | Retrieval Number: 100.1/ijsce.F452713060824 | DOI: 10.35940/ijsce.F4527.13060124

Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Fog/Edge computing represents a transformative paradigm in the realm of computing, extending the capabilities of traditional cloud computing to the edge of the network. This approach enables real-time data processing and reduces latency, thereby offering immense potential for revolutionizing various sectors, including higher education. The higher education system faces numerous challenges, among which data security and privacy concerns loom large. With the proliferation of digital platforms for learning and administrative purposes, educational institutions are increasingly vulnerable to data breaches and unauthorized access. However, edge computing emerges as a beacon of hope, offering a solution to these pressing security issues. By leveraging edge devices deployed within educational institutions, sensitive data can be processed and stored locally, minimizing exposure to potential threats from external entities. Our proposed methodology involves the strategic deployment of edge devices equipped with robust security measures, including encryption techniques and access controls. This approach ensures that sensitive educational data remains protected against unauthorized access or breaches while still facilitating efficient data processing. Moreover, by distributing computational tasks closer to end-users, this methodology reduces reliance on centralized servers, thereby enhancing overall system efficiency. The adoption of this novel approach brings forth a plethora of benefits to the higher education system. Not only does it bolster data security and privacy protection, but it also enhances data processing efficiency and reduces latency.

Keywords: Fog Computing, Cloud Computing, Edge Computing, Data Security, Privacy Protection.
Scope of the Article: Computer Networks and Its Applications