Secure Fog Computing: Providing Data Security

Abstract

Fog computing is a term for an alternative to cloud computing that puts some kinds of transactions and resources at the edge of a network, rather than establishing channels for cloud storage and utilization. Proponents of fog computing argue that it can reduce the need for bandwidth by not sending every bit of information over cloud channels, and instead aggregating it at certain access points, such as routers. This allows for a more strategic compilation of data that may not be needed in cloud storage right away, if at all. By using this kind of distributed strategy, project managers can lower costs and improve efficiencies. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. In this paper, we discussed this paradigm in detail and review the work that has been done using this technology.

Authors and Affiliations

T. Rajesh Kanna, M. Nagaraju, Ch. Vijay Bhaskar

Keywords

Related Articles

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens

Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth...

Intrusion Detection System (IDS) for Wireless Ad-hoc Networks using Evolution Identification on Streaming Network Data for Detecting Unknown Network Attacks

Over last few decades design of Network Intrusion Detection System (NIDS) has been a challenging problem faced by research community. Although various approaches have been proposed to design efficient NIDS the engin...

Design of Energy Efficient Logic Using Adiabatic Technique

With the adiabatic switching approach, the circuit energies are conserved rather than dissipated as heat. Depending on the application and the system requirements, this approach can be used to reduce the power dissip...

Design Of Virtual Sense Technology For System Interface

A gesture-based human computer interaction can make computers and devices easier to use, such as by allowing people to control the application on windows by moving their hands through the air. Existing solutions have...

Effective R-cube Algorithm for Deriving Relevant Information on the Web

The analysis of user search goals can be very useful in improving search engine relevance and user experience. A novel approach to infer user search goals by examines search engine query logs. A framework to determin...

Download PDF file
  • EP ID EP28137
  • DOI -
  • Views 276
  • Downloads 1

How To Cite

T. Rajesh Kanna, M. Nagaraju, Ch. Vijay Bhaskar (2015). Secure Fog Computing: Providing Data Security. International Journal of Research in Computer and Communication Technology, 4(1), -. https://www.europub.co.uk/articles/-A-28137