Hindering Data Theft Attacks Using Fog Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
Cloud Computing enables multiple users to share common computing resources, and to access and store their personal and business information A major amount of professional and personal data is stored on cloud.Cloud storage is being used enormously in various industrial sectors. A major amount of professional and personal data is stored on cloud. Cloud storage is being used enormously in various industrial sectors. In spite of the abundant advantages of storing data on cloud, Security still remains a major hurdle which needs to be conquered. Data on Cloud is being accessed with the new communication and computing paradigms which further arises new data security challenges. The subsisting methods of protecting data on cloud have failed in preventing data theft attacks. An altered approach is used known as fog computing which uses the two techniques viz. User Behaviour Profiling and Decoy Technology. Inspite of the these techniques, there occurs a problem of the wrong information appearing to the correct user and also the misidentification of user as an attacker then the situation goes up side down and user faces inconvenience and dissatisfaction. In this paper, we propose a technique to solve the mentioned problem i.e. implementation of Cusum algorithm which detects changes in user access patterns and calculates average fluctuation efficiently and thus enhances the accuracy to detect the insider data theft attacks.
Authors and Affiliations
Ashadeep, Sachin Majithia
A Review on Steganography & Cryptography Techniques
There is a need for more secure methods for transferring data between source to destination due to increase in the number of attack recorded during electronic exchange Cryptography and steganography are well known and w...
A VBA Based Computer Program for Nonlinear FEA of Large Displacement 2D Beam Structures
This article proposes a methodology for implementing a VBA based nonlinear FEA program in Microsoft Excel, for analyzing large displacement 2D beam structures. The program uses 2 noded - 6 degrees of freedom elements, a...
Introduction To Artificial Intelligence.
Artificial Intelligent is simulating the human brain in real time, complete with artificial consciousness and artificial general intelligence, whereas the "mechanisms of knowledge representation in the brain which is eq...
Gaurav Kumar, Prof. Durgesh Wadbude
We propose a novel compression scheme for digital images using chrominance channels with feature descriptor and Discrete Cosine Transform (DCT). The feature descriptor of chrominance channel is based on their error metr...
Autonomous Robot for Identification of Soil Parameters and Collecting Scrap from Farm
According to UNICEF solid waste can be classified into biodegradable and non biodegradable. Non biodegradable wastes cannot be decomposed by biological process. Plastics and other metals in agricultural field cause many...