Fog Computing : Implementation of Security and Privacy to Comprehensive Approach for Avoiding Knowledge Thieving Attack Exploitation Decoy Technology
Keywords:
Cloud Computing, User Behavior Profiling, information Security and truth proof, Fog Computing, Security.Abstract
Now days, Cloud network is less secure or defend the data on cloud from the data felony attacks, principally corporate executive attacks. An oversized and secure of skilled and private information is kept on Cloud server. Cloud network storage is getting used in numerous industrial sectors. During this sector of the abundant blessings of storing information on cloud, Security still remains a serious downside that must be conquered. Computers system is employed to access the data on Cloud, with the new communication and computing network produce new information security challenges. The subsisting ways of protective secure and vital information on cloud have unsuccessful in preventing information felony attacks. AN altered approach is administrated for securing the data, additionally to the previous normal cryptography mechanisms. The user’s victimization the Cloud square measure monitored and their access patterns square measure recorded. All Users have a novel profile that is monitored and updated to the server. Once AN unwanted activity like unauthorized permission access or random and untargeted hunt for information is detected that isn't seemingly to be of the $64000 user, a misinformation attack is launched. The any user or one who is attempting to access the own information is formed to answer the protection queries. An oversized quantity of Decoy information is provided or out there to the aggressor that successively protects the user’s real information.
References
- Yogesh K Nath, Rupesh R Bhairat, Ajit N Ghagare” Implementation of Security and Privacyon Fog Computing using DecoyTechnique” International Engineering Research Journal (IERJ), Volume 2 Issue 9 Page 3446-3448, 2017 ISSN 2395-1621
- D. C. Saste, P. V. Madhwai, N. B. Lokhande, V. N.Chothe, “FOG COMPUTING: Comprehensive Approach for Avoiding Data Theft Attack Using Decoy Technology”, IJCTA, Sept-Oct 2014.
- Ben-Salem M., and Stolfo, Angelos D. Keromytis, “Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud,” IEEE symposium on security and privacy workshop (SPW) 2012.
- “Protect Sensitive Data in Public Cloud from an Theft Attack and detect Abnormal Client Behavior”May2014
- CLOUD SECURITY USING FOG COMPUTING Proceedings of IRF International Conference, 30th March-2014
- Minimizing Internal Data Theft in Cloud Through Disinformation Attacks P.Jyothi1, R.Anuradha2, Dr.Y.Vijayalata3 International Journal of Advanced Research in Computer and Communication Engineering
- SECURED CLOUD COMPUTING WITH DECOY DOCUMENTS 1DNYANESH S. PATIL, 2SUYASH S. PATIL, 3DEEPAK P. POTE, 4NILESH V. KOLI Proceedings of 4th IRF International Conference, Pune, 16th March-2014
- Madhusri.K,Navneet. “ Fog Computing: Detecting Malicious Attacks in a cloud international Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013.
- Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,” March 2010. [Online]. Available:https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
- M. Arrington, “In our inbox: Hundreds of con- fidential twitter documents,” July 2009. [Online]. Available: http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-of- confidential-twitter-documents/ [11] D. Takahashi, “French hacker who leaked Twitter doc- uments to TechCrunch is busted,” March 2010. [On- line].
- P. Allen, “Obama’s Twitter password revealed after french hacker ar- rested for breaking into U.S.president’s account,” March 2010.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.