Secure Fog Computing: Providing Data Security
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 1
Abstract
Fog computing is a term for an alternative to cloud computing that puts some kinds of transactions and resources at the edge of a network, rather than establishing channels for cloud storage and utilization. Proponents of fog computing argue that it can reduce the need for bandwidth by not sending every bit of information over cloud channels, and instead aggregating it at certain access points, such as routers. This allows for a more strategic compilation of data that may not be needed in cloud storage right away, if at all. By using this kind of distributed strategy, project managers can lower costs and improve efficiencies. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. In this paper, we discussed this paradigm in detail and review the work that has been done using this technology.
Authors and Affiliations
T. Rajesh Kanna, M. Nagaraju, Ch. Vijay Bhaskar
Unique i : An Integrated Automated Altered Fingerprint Identification System
Fingerprint identification systems are very useful in several biometric applications. They are capable of finding correct person with proper identification. Fingerprint identification systems are based on fingerprint...
In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm
In this paper, a data mining technique, Fuzzy C Means Clustering (FCM) based data hiding algorithm (FCM-DH) is used to divide pixels into classes or clusters from the encrypted image. Clustering of pixels in an encry...
Authentication Token as SSO Devices
Authentication is a process by which a person verifies that someone is who he claims he is. There are many ways of authentication as user login authentication, one-way authentication of communicating entities and two...
Design and VLSI Implementation of A Radix-4 64 - Point FFT Processor
It is important to develop a high-performance FFT processor to meet the requirements of real time and low cost in many different systems. So a radix-4 pipelined FFT processor based on Field Programmable Gate Array (FP...
Modeling of Single-Phase Semi-Z-source Inverter
This paper presents several single-phase non-isolated semi-Z-source inverters for small distributed power generator in grid-connected applications with low cost and doubly grounded features. These semi-Z-source invert...