Secure Fog Computing: Providing Data Security
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 1
Abstract
Fog computing is a term for an alternative to cloud computing that puts some kinds of transactions and resources at the edge of a network, rather than establishing channels for cloud storage and utilization. Proponents of fog computing argue that it can reduce the need for bandwidth by not sending every bit of information over cloud channels, and instead aggregating it at certain access points, such as routers. This allows for a more strategic compilation of data that may not be needed in cloud storage right away, if at all. By using this kind of distributed strategy, project managers can lower costs and improve efficiencies. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. In this paper, we discussed this paradigm in detail and review the work that has been done using this technology.
Authors and Affiliations
T. Rajesh Kanna, M. Nagaraju, Ch. Vijay Bhaskar
A Review – OFDM-RoF (Radio over Fiber) System for Wireless Network
In future generation wireless and mobile communication system must be increase with high quality bandwidth service for inaccessible area. The recent wireless network providers require high transmission bandwidth with...
Content-based image retrieval using DWT based feature extraction and texture, shape and color features
Content Based Image Retrieval (CBIR) is the retrieval of images based on visual features such as colour, texture and shape. In this paper, we propose the algorithm on the basis of extraction and matching of color and...
An Optimal and Secure Ranking Search Over out Sourced Cloud Databases
Considering top k multi keywords from the out sourced information files is still an intriguing examination issue in light of the fact that out sourced information over cloud can be scrambled for secrecy .In this pape...
Secure Data Aggregation In Wireless Networks
Security threat is originated by node capture attacks in hierarchical data aggregation where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a hig...
A Novel Multi owner Data sharing Group key protocol
Storing data on remote cloud storage makes the maintenance affordable by data owners. The reliability and trustworthiness of these remote storage locations is the main concern for data owners and cloud service provid...