Hindering Data Theft Attacks Using Fog Computing

Abstract

Cloud Computing enables multiple users to share common computing resources, and to access and store their personal and business information A major amount of professional and personal data is stored on cloud.Cloud storage is being used enormously in various industrial sectors. A major amount of professional and personal data is stored on cloud. Cloud storage is being used enormously in various industrial sectors. In spite of the abundant advantages of storing data on cloud, Security still remains a major hurdle which needs to be conquered. Data on Cloud is being accessed with the new communication and computing paradigms which further arises new data security challenges. The subsisting methods of protecting data on cloud have failed in preventing data theft attacks. An altered approach is used known as fog computing which uses the two techniques viz. User Behaviour Profiling and Decoy Technology. Inspite of the these techniques, there occurs a problem of the wrong information appearing to the correct user and also the misidentification of user as an attacker then the situation goes up side down and user faces inconvenience and dissatisfaction. In this paper, we propose a technique to solve the mentioned problem i.e. implementation of Cusum algorithm which detects changes in user access patterns and calculates average fluctuation efficiently and thus enhances the accuracy to detect the insider data theft attacks.

Authors and Affiliations

Ashadeep, Sachin Majithia

Keywords

Related Articles

Review of Railway Track Fault Finding System

In India so many transport facilities is available. In which railway played vital role to transport of Indian population. The Indian population is on second position in world. So, transportation problem is reduced becau...

Hop and Route

In this paper, The PEFT (Penalize Exponential Flow Splitting) achieves optimal traffic engineering with compare to other protocols like OSPF, DEFT. While DEFT is also new link state routing protocol provably achieves op...

An Automatic Close Loop Embedded System for Real Time Monitoring of Speed and Torque of Motor

The system proposed in this project aims at monitoring the torque and efficiency in induction motors in real time by employing wireless sensor networks (WSNs). An embedded system is employed for acquiring electrical sig...

Application of Interleaved Bridgeless Boost PFC Converter without Current Sensing

Interleaved bridgeless boost power factor correction (PFC) converter based on predictive control method without any current sensing is presented in this paper. Complicated control strategies including current sensing ar...

Experimental Study of Light Weight Concrete Using PP Fiber

Concrete is acknowledged to be a relatively brittle material when subjected to normal stresses and impact loads, where tensile strength is approximately just one tenth of its compressive strength. the addition of steel...

Download PDF file
  • EP ID EP19206
  • DOI -
  • Views 263
  • Downloads 4

How To Cite

Ashadeep, Sachin Majithia (2014). Hindering Data Theft Attacks Using Fog Computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://europub.co.uk/articles/-A-19206