Hindering Data Theft Attacks Using Fog Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
Cloud Computing enables multiple users to share common computing resources, and to access and store their personal and business information A major amount of professional and personal data is stored on cloud.Cloud storage is being used enormously in various industrial sectors. A major amount of professional and personal data is stored on cloud. Cloud storage is being used enormously in various industrial sectors. In spite of the abundant advantages of storing data on cloud, Security still remains a major hurdle which needs to be conquered. Data on Cloud is being accessed with the new communication and computing paradigms which further arises new data security challenges. The subsisting methods of protecting data on cloud have failed in preventing data theft attacks. An altered approach is used known as fog computing which uses the two techniques viz. User Behaviour Profiling and Decoy Technology. Inspite of the these techniques, there occurs a problem of the wrong information appearing to the correct user and also the misidentification of user as an attacker then the situation goes up side down and user faces inconvenience and dissatisfaction. In this paper, we propose a technique to solve the mentioned problem i.e. implementation of Cusum algorithm which detects changes in user access patterns and calculates average fluctuation efficiently and thus enhances the accuracy to detect the insider data theft attacks.
Authors and Affiliations
Ashadeep, Sachin Majithia
Clustering Techniques in Data Mining
Clustering is a division of data into groups of similar objects. Each group, called cluster, consists of objects that are similar between themselves and dissimilar to objects of other groups. Clustering can be considere...
Compact embedded system based locator, detector, and dimmer Red box
As many applications like vehicle tracking, alcohol detection, accident detection, automatic dimming of light is based on sensor technology and microcontroller using embedded programming it is impossible to bring all th...
Challenges and Issues of E-Commerce
This paper analyzes some of the opportunities and challenges of ecommerce. It highlights some of the challenges faced by users in browsing websites and conducting searches for information and provides a few guidelines o...
Numerical Study on Thermal and Flow Characteristics of Air in a Square Duct using Delta Wing Vortex Generators
The impact of delta wing vortex generators in a square duct on the thermal and flow characteristics execution has been numerically explored in this study. The vortex generator allows the air flow to distribute more and...
Method & Implementation of Relocalisation and Management for Smart System in WSN
during the development of a WSN, it is unknown which influences the nodes might experience, which nodes might crash and how long exactly the sensor nodes will last with available energy. Also nodes might experience high...