Secure Fog Computing: Providing Data Security

Abstract

Fog computing is a term for an alternative to cloud computing that puts some kinds of transactions and resources at the edge of a network, rather than establishing channels for cloud storage and utilization. Proponents of fog computing argue that it can reduce the need for bandwidth by not sending every bit of information over cloud channels, and instead aggregating it at certain access points, such as routers. This allows for a more strategic compilation of data that may not be needed in cloud storage right away, if at all. By using this kind of distributed strategy, project managers can lower costs and improve efficiencies. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. In this paper, we discussed this paradigm in detail and review the work that has been done using this technology.

Authors and Affiliations

T. Rajesh Kanna, M. Nagaraju, Ch. Vijay Bhaskar

Keywords

Related Articles

Pattern-Based Text Mining Method For Classification of Research Proposals

Research proposal classification is an important task for private research funding agencies. When a large number of research proposals are received, it is common to group them according to their similarities in resear...

Switched Boost Inverter for Standalone DC Nanogrid Applications

Switched boost inverter (SBI) is a singlestage power converter derived from Inverse Watkins Johnson topology. Unlike the traditional buck-type voltage source inverter (VSI), the SBI can produce an ac output voltage th...

Survey of Recent Web Prefetching Techniques

Web caching and web prefetching are the two major areas of research focused at reducing the user perceived latency. Both if used well can greatly help in reducing this latency as web caching helps in exploiting tempo...

Performance Analysis of Rotating Induction Machines for Air-Gap Eccentricity & Rotor Bar Faults using Finite Element Method

In this paper analysis used to diagnose Air-gap eccentricity and broken rotor bar fault especially in high voltage Rating machine. The analysis carried out to evaluate the performance of the machine during operation...

Achieving Data Security Using Inter Clouds

Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive inf...

Download PDF file
  • EP ID EP28137
  • DOI -
  • Views 275
  • Downloads 1

How To Cite

T. Rajesh Kanna, M. Nagaraju, Ch. Vijay Bhaskar (2015). Secure Fog Computing: Providing Data Security. International Journal of Research in Computer and Communication Technology, 4(1), -. https://www.europub.co.uk/articles/-A-28137