Hindering Data Theft Attacks Using Fog Computing

Abstract

Cloud Computing enables multiple users to share common computing resources, and to access and store their personal and business information A major amount of professional and personal data is stored on cloud.Cloud storage is being used enormously in various industrial sectors. A major amount of professional and personal data is stored on cloud. Cloud storage is being used enormously in various industrial sectors. In spite of the abundant advantages of storing data on cloud, Security still remains a major hurdle which needs to be conquered. Data on Cloud is being accessed with the new communication and computing paradigms which further arises new data security challenges. The subsisting methods of protecting data on cloud have failed in preventing data theft attacks. An altered approach is used known as fog computing which uses the two techniques viz. User Behaviour Profiling and Decoy Technology. Inspite of the these techniques, there occurs a problem of the wrong information appearing to the correct user and also the misidentification of user as an attacker then the situation goes up side down and user faces inconvenience and dissatisfaction. In this paper, we propose a technique to solve the mentioned problem i.e. implementation of Cusum algorithm which detects changes in user access patterns and calculates average fluctuation efficiently and thus enhances the accuracy to detect the insider data theft attacks.

Authors and Affiliations

Ashadeep, Sachin Majithia

Keywords

Related Articles

Inherent Selection Of Tuberculosis Using Graph Cut Segmentation

Tuberculosis (TB) is a major global health threat. An estimated one-third of the world’s population has been exposed to TB, and millions of new infections are occurring every year. Tuberculosis naturally affects the lun...

Review on Experimental Analysis of Heat Transfer in Shell and Twisted Tube Heat Exchanger

In recent years, the high cost of energy and material has resulted in an increased effort aimed at producing more efficient heat exchange equipment. The heat transfer rate can be improved by introducing a disturbance in...

slugLink Lifetime Prediction in Position-Based VANET Routing Protocol

Vehicular ad hoc network enables the vehicles to wirelessly network with other vehicles nearby without the aid of a permanent infrastructure. One of the main design constraints of vehicular ad hoc netwo...

A Review of Development of Mechanical Properties of Self Compacting Concrete Contain Rice Husk Ash

The scope of this research was to determine the usefulness of Rice husk ash (RHA) in the development of economical self compacting concrete (SCC). The cost of materials will be decreased by reducing the cement content b...

Utilization of Plastic Waste in Foundry Sand Bricks.

There has been a considerable imbalance between the availability of conventional building materials and their demand in the recent past. On the other hand the foundry waste Sand is abundantly available and the disposal...

Download PDF file
  • EP ID EP19206
  • DOI -
  • Views 322
  • Downloads 4

How To Cite

Ashadeep, Sachin Majithia (2014). Hindering Data Theft Attacks Using Fog Computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://europub.co.uk/articles/-A-19206