Hindering Data Theft Attacks Using Fog Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
Cloud Computing enables multiple users to share common computing resources, and to access and store their personal and business information A major amount of professional and personal data is stored on cloud.Cloud storage is being used enormously in various industrial sectors. A major amount of professional and personal data is stored on cloud. Cloud storage is being used enormously in various industrial sectors. In spite of the abundant advantages of storing data on cloud, Security still remains a major hurdle which needs to be conquered. Data on Cloud is being accessed with the new communication and computing paradigms which further arises new data security challenges. The subsisting methods of protecting data on cloud have failed in preventing data theft attacks. An altered approach is used known as fog computing which uses the two techniques viz. User Behaviour Profiling and Decoy Technology. Inspite of the these techniques, there occurs a problem of the wrong information appearing to the correct user and also the misidentification of user as an attacker then the situation goes up side down and user faces inconvenience and dissatisfaction. In this paper, we propose a technique to solve the mentioned problem i.e. implementation of Cusum algorithm which detects changes in user access patterns and calculates average fluctuation efficiently and thus enhances the accuracy to detect the insider data theft attacks.
Authors and Affiliations
Ashadeep, Sachin Majithia
Brain Tumor Detection in MRI using Segmentation and Classification Technique
The large data set demands a highly productive segmentation and classification system. This system shows brain tumor classification in the form of different classes. This system depends on segmentation scheme. The segme...
A Literature Review on Integrated Approach for Grey Water Treatment
Water is critical for all life on the planet. Rapid industrialization and urbanization has caused India to face a water crisis since it has only 4 percent of the world’s water resources. In order to resolve the crisis,...
Numerical investigation of the effects of natural convection on the melting process of phase change material in cylindrical annulus
A numerical simulation of the melting process of a phase change material in a horizontal cylindrical annulus has been studied in this paper. Numerical study has been carried out for melting of paraffin wax as phase chan...
Diagnosis of thyroid disorders using Backpropagation method
The diagnosis of thyroid disorders using back propagation algorithm by training feed-forward neural network has been discussed in this paper. The body’s metabolic rate is controlled by thyroid hormones secreted by Thyro...
Temperature Distribution Analysis of Composite Heat Sink (Pin Fin) By Experimental and Finite Element Method
design of machine components plays a vital role in the field of engineering where it includes the shapeof component, size, applied loads, position and materials used. Due to the applied loads namely static, thermal and...