Hindering Data Theft Attacks Using Fog Computing

Abstract

Cloud Computing enables multiple users to share common computing resources, and to access and store their personal and business information A major amount of professional and personal data is stored on cloud.Cloud storage is being used enormously in various industrial sectors. A major amount of professional and personal data is stored on cloud. Cloud storage is being used enormously in various industrial sectors. In spite of the abundant advantages of storing data on cloud, Security still remains a major hurdle which needs to be conquered. Data on Cloud is being accessed with the new communication and computing paradigms which further arises new data security challenges. The subsisting methods of protecting data on cloud have failed in preventing data theft attacks. An altered approach is used known as fog computing which uses the two techniques viz. User Behaviour Profiling and Decoy Technology. Inspite of the these techniques, there occurs a problem of the wrong information appearing to the correct user and also the misidentification of user as an attacker then the situation goes up side down and user faces inconvenience and dissatisfaction. In this paper, we propose a technique to solve the mentioned problem i.e. implementation of Cusum algorithm which detects changes in user access patterns and calculates average fluctuation efficiently and thus enhances the accuracy to detect the insider data theft attacks.

Authors and Affiliations

Ashadeep, Sachin Majithia

Keywords

Related Articles

Improving Network Lifetime Using Mobile Sink in Clustered Wireless Sensor Networks

In Wireless Sensor Networks, sensors are used to detect abnormal event and report the sensed data to the sink. Sensors have limited power resources. Sensor nodes deliver sensed data back to the sink. The sensor nodes ne...

Risk Assessment And Air Pollution In The Cement Industry And Consequences

Even in the twenty-first century, millions of people are working daily in a dusty environment. They are exposed to different types of health hazards i.e., fume, gases and dust, which are risk factors in developing occup...

Analysis of Switched Boost Inverter for Induction Machine Drive Application

Recently, developments in power electronics and semiconductor technology have lead improvements in power electronic systems. The Switched Boost Inverter is a single stage dc-ac converter, whose output voltage can be eit...

Crystal Growth, Functional, Thermal and Optical Characterizations of Pure and Cobalt Doped Calcium Oxalate Monohydrate Crystals by Single Diffusion Gel Method

calcium stones are most commonly occurring form of nephrolithiasis or urinary stones which is one of the oldest and common afflictions of humans. Of course the calcium oxalate is one of the principle components of urina...

Automobile A.C. By Utilizing Exhaust Gases

Energy efficiency has been a major topic of discussions on natural resources preservation and costs reduction. Based on estimates of energy resources reduction at medium and long terms, internal combustion engines are p...

Download PDF file
  • EP ID EP19206
  • DOI -
  • Views 288
  • Downloads 4

How To Cite

Ashadeep, Sachin Majithia (2014). Hindering Data Theft Attacks Using Fog Computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://europub.co.uk/articles/-A-19206