Hindering Data Theft Attacks Using Fog Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
Cloud Computing enables multiple users to share common computing resources, and to access and store their personal and business information A major amount of professional and personal data is stored on cloud.Cloud storage is being used enormously in various industrial sectors. A major amount of professional and personal data is stored on cloud. Cloud storage is being used enormously in various industrial sectors. In spite of the abundant advantages of storing data on cloud, Security still remains a major hurdle which needs to be conquered. Data on Cloud is being accessed with the new communication and computing paradigms which further arises new data security challenges. The subsisting methods of protecting data on cloud have failed in preventing data theft attacks. An altered approach is used known as fog computing which uses the two techniques viz. User Behaviour Profiling and Decoy Technology. Inspite of the these techniques, there occurs a problem of the wrong information appearing to the correct user and also the misidentification of user as an attacker then the situation goes up side down and user faces inconvenience and dissatisfaction. In this paper, we propose a technique to solve the mentioned problem i.e. implementation of Cusum algorithm which detects changes in user access patterns and calculates average fluctuation efficiently and thus enhances the accuracy to detect the insider data theft attacks.
Authors and Affiliations
Ashadeep, Sachin Majithia
Design, development and performance evaluation of residual crop chipping machine
After harvesting it is customary to leave the stalks in the field as they are. Before the next cultivation season commences, these stalks get dried in the sun and are then burnt as firewood in households or burnt in the...
Experimental Study on Fibre Reinforced High Volume Fly Ash Concrete for RCC Construction
Road projects in future have to be environmental friendly and cost effective apart from being safe so that society at large is benefited by the huge investments made in the infrastructure projects. To achieve this, comp...
Survey on METASPLOIT Framework
Penetration testing is a uniquely challenging job. Paid to think like a criminal to use guerilla tactics to advantage, and to find the weakest links in a highly intricate net of defenses. The most widely used tool by th...
Implementation of Document Envelope Rest APIS for B2B Sterling Integrator
a document envelope consists of control information that enables organizations to effectively exchange documents. The document envelope takes the original document, assigns a control number, and packages header and trai...
Performance Metrics and Analysis for Node Clone Detection Schemes in Wireless Sensor Networks
Wireless sensor networks are now-a-days rapidly developing in the field of science and technology. And it promises to have a large number of applications in next generation networks (NGN). The wireless sensor networks c...