Hindering Data Theft Attacks Using Fog Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
Cloud Computing enables multiple users to share common computing resources, and to access and store their personal and business information A major amount of professional and personal data is stored on cloud.Cloud storage is being used enormously in various industrial sectors. A major amount of professional and personal data is stored on cloud. Cloud storage is being used enormously in various industrial sectors. In spite of the abundant advantages of storing data on cloud, Security still remains a major hurdle which needs to be conquered. Data on Cloud is being accessed with the new communication and computing paradigms which further arises new data security challenges. The subsisting methods of protecting data on cloud have failed in preventing data theft attacks. An altered approach is used known as fog computing which uses the two techniques viz. User Behaviour Profiling and Decoy Technology. Inspite of the these techniques, there occurs a problem of the wrong information appearing to the correct user and also the misidentification of user as an attacker then the situation goes up side down and user faces inconvenience and dissatisfaction. In this paper, we propose a technique to solve the mentioned problem i.e. implementation of Cusum algorithm which detects changes in user access patterns and calculates average fluctuation efficiently and thus enhances the accuracy to detect the insider data theft attacks.
Authors and Affiliations
Ashadeep, Sachin Majithia
Improving Network Lifetime Using Mobile Sink in Clustered Wireless Sensor Networks
In Wireless Sensor Networks, sensors are used to detect abnormal event and report the sensed data to the sink. Sensors have limited power resources. Sensor nodes deliver sensed data back to the sink. The sensor nodes ne...
Risk Assessment And Air Pollution In The Cement Industry And Consequences
Even in the twenty-first century, millions of people are working daily in a dusty environment. They are exposed to different types of health hazards i.e., fume, gases and dust, which are risk factors in developing occup...
Analysis of Switched Boost Inverter for Induction Machine Drive Application
Recently, developments in power electronics and semiconductor technology have lead improvements in power electronic systems. The Switched Boost Inverter is a single stage dc-ac converter, whose output voltage can be eit...
Crystal Growth, Functional, Thermal and Optical Characterizations of Pure and Cobalt Doped Calcium Oxalate Monohydrate Crystals by Single Diffusion Gel Method
calcium stones are most commonly occurring form of nephrolithiasis or urinary stones which is one of the oldest and common afflictions of humans. Of course the calcium oxalate is one of the principle components of urina...
Automobile A.C. By Utilizing Exhaust Gases
Energy efficiency has been a major topic of discussions on natural resources preservation and costs reduction. Based on estimates of energy resources reduction at medium and long terms, internal combustion engines are p...