An efficient fog computing for comprising approach to avoid data theft attack
-
2018-03-19 https://doi.org/10.14419/ijet.v7i2.8.10556 -
Edge Computing, Decoy Technology, Data Integration and Security Issues Verification. -
Abstract
Cloud computing has become a new paradigm shift in the IT world because of its revolutionary model of computing. It provides flexibility, scalability, and reliability and decreased operational and support expenses for an organization. The Enterprise edition software’s are very costly and maintaining a separate IT team and maintaining their own servers is very expensive and that’s the reason why most of the companies are opting for Cloud computing over enterprise edition of the software. However, few organization cloud customers are not willing to step to cloud computing up on a big scale because of the safety problems present in cloud computing. One more disadvantage of Cloud is it’s not suitable for another revolutionary technology i.e.IoT(Internet of things)
In this paper we are going to present the Advantages of Fog Computing and Decoy technology to address the security in cloud computing by extending it into fog computing.
Fog Computing is a new paradigm in which the computing power moves to the edge of the network. So, it’s also called as Edge Computing.
-
References
[1] Ben-Salem M., and Stolfo, Angelos D. Keromytis, “Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud,†IEEE symposium on security and privacy workshop (SPW) 2012.
[2] “Protect Sensitive Data in Public Cloud from a Theft Attack anddetectAbnormalClientBehaviourâ€May2014http://ijesc.org/upload/cb5bd9241011e5817686fbf01bfe503e.Protect%20Sensitive%20Data%20in%20Public%20Cloud%20from%2 0an%20Theft%20Attack%20and%20detect%20Abnormal%20Client% 20Behavior.pdf
[3] Cloud Security Using Fog Computing Proceedings of IRF International Conference, 30th March-2014 http://iraj.in/up_proc/pdf/56-13963354905-7.pdf
[4] V. SriharshaStudent,Dept. Of CSE SNIST, Ghatkesar, India V. PrabhakarDept. Of CSE. SNIST, Ghatkesar, India N.KrishnaChythanya SVSIT, Warangal, India “Dynamic Decoy File Usage to Protect from malicious insider for data on public cloud†International Journal of Advanced Engineering and Global Technology Vol-1, Issue-3, October 2013 http://ijaegt.com/wpcontent/uploads/2013/10/IJAEGT-309128-page-98-102.pdf
[5] Securing the cloud using Decoy Information Technology to prevent them from distinguishing the Real Sensitive data from fake Worthless data EtikalaAruna, Dr. Ch GVN Prasad, A. Malla Reddy Issue9,September2013http://www.ijarcsse.com/docs/papers/Volume_3/9_September2013/V3I 9-0155.pdf
[6] Minimizing Internal Data Theft in Cloud Through Disinformation Attacks P. Jyothi1, R. Anuradha2, Dr.Y. Vijayalata3 International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 9, September2013http://www.ijarcce.com/upload/2013/september/20Jyothi%20P%20Minimizing%20Internal%20Data%20Theft%20in%20Cloud.pdf
[7] Secured Cloud Computing With Decoy Documents 1dnyanesh S. Patil, 2suyash S. Patil, 3deepak P. Pote, 4nilesh V. KoliProceedings of 4th IRF International Conference, Pune, 16th March-2014 http://iraj.in/up_proc/pdf/52-1395229730159- 161.pdf
[8] Madhusri.K,Navneet. “Fog Computing: Detecting Malicious Attacks in a cloud international Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013.
[9] Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,†March 2010. [Online]. Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
[10] M. Arrington, “In our inbox: Hundreds of con- fidential twitter documents,†July 2009. [Online]. Available: http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-ofconfidential-twitter-documents/
[11] D. Takahashi, “French hacker who leaked Twitter doc- uments to TechCrunch is busted,†March 2010. [On- line]. Available: http://venturebeat.com/2010/03/24/french-hacker-who- leaked-twitter documents-to-TechCrunch-is-busted/
[12] D. Danchev, “ZDNET: French hacker gains access to twitter’s admin panel,†April 2009. [Online]. Avail- able: http://www.zdnet.com/blog/security/french-hacker-gains-access-totwitters-admin-panel/3292 [13] P. Allen, “Obama’s Twitter password revealed after French hacker ar- rested for breaking into U.S. president’s account,†March 2010.Available: http.
[13] Dr. Seetaiah Kilaru, Hari Kishore K, Sravani T, Anvesh Chowdary L, Balaji T “Review and Analysis of Promising Technologies with Respect to fifth Generation Networksâ€, 2014 First International Conference on Networks & Soft Computing, ISSN:978-1-4799-3486-7/14,pp.270-273,August2014.
[14] Meka Bharadwaj, Hari Kishore "Enhanced Launch-Off-Capture Testing Using BIST Designs†Journal of Engineering and Applied Sciences, ISSN No: 1816-949X, Vol No.12, Issue No.3, page: 636-643, April 2017.
[15] P Bala Gopal, K Hari Kishore, B.Praveen Kittu “An FPGA Implementation of On Chip UART Testing with BIST Techniquesâ€, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 14 , pp. 34047-34051, August 2015.
[16] Murali, K Hari Kishore, D Venkat Reddy "Integrating FPGAs with Trigger Circuitry Core System Insertions for Observability in Debugging Process†Journal of Engineering and Applied Sciences, ISSN No: 1816-949X, Vol No.11, Issue No.12, page: 2643-2650, December 2016.
[17] Mahesh Mudavath, K Hari Kishore, D Venkat Reddy "Design of CMOS RF Front-End of Low Noise Amplifier for LTE System Applications Integrating FPGAs†Asian Journal of Information Technology, ISSN No: 1682-3915, Vol No.15, Issue No.20, page: 4040-4047, December 2016.
[18] N Bala Dastagiri, K Hari Kishore "Novel Design of Low Power Latch Comparator in 45nm for Cardiac Signal Monitoringâ€, International Journal of Control Theory and Applications, ISSN No: 0974-5572, Vol No.9, Issue No.49, page: 117-123, May 2016.
[19] N Bala Gopal, Kakarla Hari Kishore "Reduction of Kickback Noise in Latched Comparators for Cardiac IMDs†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.43, Page: 1-6, November 2016.
[20] S Nazeer Hussain, K Hari Kishore "Computational Optimization of Placement and Routing using Genetic Algorithm†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.47, page: 1-4, December 2016.
[21] N.Prathima, K.Hari Kishore, “Design of a Low Power and High Performance Digital Multiplier Using a Novel 8T Adderâ€, International Journal of Engineering Research and Applications, ISSN: 2248-9622, Vol. 3, Issue.1, Jan-Feb., 2013.
[22] Meka Bharadwaj, Hari Kishore "Enhanced Launch-Off-Capture Testing Using BIST Designs†Journal of Engineering and Applied Sciences, ISSN No: 1816-949X, Vol No.12, Issue No.3, page: 636-643, April 2017.
-
Downloads
-
How to Cite
Pavan Kumar, T., Eswar, B., Ayyappa Reddy, P., & Sindhu Bhargavi, D. (2018). An efficient fog computing for comprising approach to avoid data theft attack. International Journal of Engineering & Technology, 7(2.8), 680-683. https://doi.org/10.14419/ijet.v7i2.8.10556Received date: 2018-03-24
Accepted date: 2018-03-24
Published date: 2018-03-19