Survey on Fog Computing Mitigating Data Theft Attacks in Cloud

Abstract

Cloud computing now-a-days forms a very important unit in the online world, by modifying how the computers and Internet were used few years back. Cloud computing provides the facility to store personal information and the information related to the business firms along with its access from anywhere in the world. In event of providing the facility cloud has many drawbacks related to its security which is mainly termed as data theft attacks. Especially these drawbacks are more offensive when done by an insider. So to overcome these drawbacks we are proposing a new technology called Fog Computing. Fog Computing forms a single unit by dealing with two different technologies i.e. User Behavior Profiling and Decoy Information Technology. Using these technologies we detect the behavior of the user and compare it with the normal user behavior. Along with this we provide authentication by various challenge questions so that hacking the login credentials does not log into the account. Besides this if any unauthorized access is detected providing with the fake data so that real data should be saved from hacking. Thus provides higher levels of security to the cloud.

Authors and Affiliations

Viraj Girish Mandlekar, Vireshkumar Mahale, Sanket Satish Sancheti, Maaz Shad Rais

Keywords

Related Articles

FUZZY Based Design of Parallel Park Assist SystemControlStrategy

The automatic parking is one of the growing topics that claim to enhance the comfort and safety of driving. It can help drivers automatically drive the vehicle in constrained environments where much attention and experie...

Aspects to Consider While Developing Therapeutic Monoclonal Antibodies

Probably preponderance of exogenous protein therapeutics are still in the research phase. Numerous goods have been sold worldwide in 2006. The US Food and Drug Administration (FDA) has accepted an overwhelming amount of...

Multi-Layered Security System Using Cryptography and Steganography

—The Internet as a whole does not use secure links, thus information being transmitted may be vulnerable to interception as well. The importance of reducing the chances of information being detected during transmission i...

Design and Implementation of a Novel Modular Armed Advanced Robotic System (MAARS)

A Modular Armed Advanced Robotic System based on face recognition is intended for military applications identifies the unidentified individuals in border area or conflict zones or in any comparable location, and conducts...

A Review on Microbial Production of Vitamins

Vitamins are vital nutrients that can be produced by the body and are only required in tiny quantities in the diet. Vitamins are chemical molecules that must be consumed in tiny amounts since the body cannot produce them...

Download PDF file
  • EP ID EP749018
  • DOI -
  • Views 47
  • Downloads 0

How To Cite

Viraj Girish Mandlekar, Vireshkumar Mahale, Sanket Satish Sancheti, Maaz Shad Rais (2014). Survey on Fog Computing Mitigating Data Theft Attacks in Cloud. International Journal of Innovative Research in Computer Science and Technology, 2(6), -. https://europub.co.uk./articles/-A-749018