Hindering Data Theft Attacks Using Fog Computing

Abstract

Cloud Computing enables multiple users to share common computing resources, and to access and store their personal and business information A major amount of professional and personal data is stored on cloud.Cloud storage is being used enormously in various industrial sectors. A major amount of professional and personal data is stored on cloud. Cloud storage is being used enormously in various industrial sectors. In spite of the abundant advantages of storing data on cloud, Security still remains a major hurdle which needs to be conquered. Data on Cloud is being accessed with the new communication and computing paradigms which further arises new data security challenges. The subsisting methods of protecting data on cloud have failed in preventing data theft attacks. An altered approach is used known as fog computing which uses the two techniques viz. User Behaviour Profiling and Decoy Technology. Inspite of the these techniques, there occurs a problem of the wrong information appearing to the correct user and also the misidentification of user as an attacker then the situation goes up side down and user faces inconvenience and dissatisfaction. In this paper, we propose a technique to solve the mentioned problem i.e. implementation of Cusum algorithm which detects changes in user access patterns and calculates average fluctuation efficiently and thus enhances the accuracy to detect the insider data theft attacks.

Authors and Affiliations

Ashadeep, Sachin Majithia

Keywords

Related Articles

Brain Tumor Detection in MRI using Segmentation and Classification Technique

The large data set demands a highly productive segmentation and classification system. This system shows brain tumor classification in the form of different classes. This system depends on segmentation scheme. The segme...

A Literature Review on Integrated Approach for Grey Water Treatment

Water is critical for all life on the planet. Rapid industrialization and urbanization has caused India to face a water crisis since it has only 4 percent of the world’s water resources. In order to resolve the crisis,...

Numerical investigation of the effects of natural convection on the melting process of phase change material in cylindrical annulus

A numerical simulation of the melting process of a phase change material in a horizontal cylindrical annulus has been studied in this paper. Numerical study has been carried out for melting of paraffin wax as phase chan...

Diagnosis of thyroid disorders using Backpropagation method

The diagnosis of thyroid disorders using back propagation algorithm by training feed-forward neural network has been discussed in this paper. The body’s metabolic rate is controlled by thyroid hormones secreted by Thyro...

Temperature Distribution Analysis of Composite Heat Sink (Pin Fin) By Experimental and Finite Element Method

design of machine components plays a vital role in the field of engineering where it includes the shapeof component, size, applied loads, position and materials used. Due to the applied loads namely static, thermal and...

Download PDF file
  • EP ID EP19206
  • DOI -
  • Views 328
  • Downloads 4

How To Cite

Ashadeep, Sachin Majithia (2014). Hindering Data Theft Attacks Using Fog Computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://europub.co.uk/articles/-A-19206