Survey on Fog Computing Mitigating Data Theft Attacks in Cloud

Abstract

Cloud computing now-a-days forms a very important unit in the online world, by modifying how the computers and Internet were used few years back. Cloud computing provides the facility to store personal information and the information related to the business firms along with its access from anywhere in the world. In event of providing the facility cloud has many drawbacks related to its security which is mainly termed as data theft attacks. Especially these drawbacks are more offensive when done by an insider. So to overcome these drawbacks we are proposing a new technology called Fog Computing. Fog Computing forms a single unit by dealing with two different technologies i.e. User Behavior Profiling and Decoy Information Technology. Using these technologies we detect the behavior of the user and compare it with the normal user behavior. Along with this we provide authentication by various challenge questions so that hacking the login credentials does not log into the account. Besides this if any unauthorized access is detected providing with the fake data so that real data should be saved from hacking. Thus provides higher levels of security to the cloud.

Authors and Affiliations

Viraj Girish Mandlekar, Vireshkumar Mahale, Sanket Satish Sancheti, Maaz Shad Rais

Keywords

Related Articles

Stabilization of Black Cotton Soil Using Red Mud and Hydrated Lime

This research paper is an effort to use those materials which are disposed as wastes for stabilizing the soil and making the process cost effective. In this research work, two waste materials such as Red Mud and Hydrated...

Artificial Intelligence in Banking and Finance

Artificial intelligence (AI) has revolutionized the banking and financial industry by improving client relations, precision, and operational efficiency. This paper explores the use of artificial intelligence (AI) in bank...

Entropy Based Deep Attention Mechanism (EDAM) To Mitigate Denial of Service (Dos) Attack Orchestrated Through Idempotent Operation

Measuring entropy in a system represents the degree of uncertainty that characterizes the smooth, free and fair conduct of the network operations. The change in quantum of entropy value raises an alarm of the unscrupulo...

A Review Article on Detection of Fake Profile on Social-Media

Nowadays, practically everyone, from a youngster to an adult, spends more time on online social media platforms, connecting with and exchanging information with individuals all over the world. The social network is becom...

Exploring the Efficacy of Basketball Shooting: A Comprehensive Analysis of Success Rates

The present study evaluated success rate of basketball shooting for different skill levels. A total of 10 subjects (5 skilled and 5 unskilled) participated in this study. The main goal of the study was to provide the pre...

Download PDF file
  • EP ID EP749018
  • DOI -
  • Views 48
  • Downloads 0

How To Cite

Viraj Girish Mandlekar, Vireshkumar Mahale, Sanket Satish Sancheti, Maaz Shad Rais (2014). Survey on Fog Computing Mitigating Data Theft Attacks in Cloud. International Journal of Innovative Research in Computer Science and Technology, 2(6), -. https://europub.co.uk/articles/-A-749018