Research Article | Open Access | Download PDF
Volume 32 | Number 2 | Year 2016 | Article Id. IJETT-V32P266 | DOI : https://doi.org/10.14445/22315381/IJETT-V32P266
FOG Computing: Preventing Insider Data Theft Attacks in Cloud Using User Behavior Profiling and Decoy Information Technology
Gayatri Kalaskar, Purva Ratkanthwar, Prachi Jagadale, Bhagyashri Jagadale
Citation :
Gayatri Kalaskar, Purva Ratkanthwar, Prachi Jagadale, Bhagyashri Jagadale, "FOG Computing: Preventing Insider Data Theft Attacks in Cloud Using User Behavior Profiling and Decoy Information Technology," International Journal of Engineering Trends and Technology (IJETT), vol. 32, no. 2, pp. 352-355, 2016. Crossref, https://doi.org/10.14445/22315381/ IJETT-V32P266
Abstract
Now a days, Cloud Computing plays very important role in the online world. In Cloud computing gives us significantly different ways of using computers to access our personal and business information. These new ways also arises some new challenges in security of cloud. Old techniques like data encryption have failed in preventing data theft where the perpetrator are insider to the cloud provider. We are proposing a new approach where data is secured by offensive decoy technology. We monitor different parameters of data access in cloud to detect data access patterns. When unauthorized data access is suspected and then verified by using challenge questions, we send large amount of decoy information to attacker. This decoy information prevents misuse of user’s real data.
Keywords
Fog Computing, Decoy Security, Decoy Information Technology.
References
1) Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis, “Fog Computing: Mitigating Insider Data theft Attacks in Cloud” IEEE 2012
2) Ivan Stojmenovic, Sheng Wen, “The Fog Computing Paradigm: Scenarios andSecurity Issues” IEEE 20143) D. C. Saste, P. V. Madhwai, N. B. Lokhande, V. N. Chothe, “FOG COMPUTING: Comprehensive Approach for Avoiding Data Theft Attack Using Decoy Technology”, IJCTA | Sept-Oct 2014 Available online@www.ijcta.com
4) Thogaricheti Ashwini, Mrs. Anuradha.S.G, “Fog Computing to protect real and sensitivity information in Cloud”, IJECSE | SSN 2277-1956/V4N1-19-29
5) Shanhe Yi, Cheng Li, Qun Li, “A Survey of Fog Computing: Concepts, Applications andIssues, ACM 2015
6) Viraj G. Mandlekar, VireshKumar Mahale, Sanket S.Sancheti, Maaz S. Rais, “Survey on Fog Computing Mitigating Data TheftAttacks in C loud”, International Journal of Innovative Research in Computer Science & Technology (IJIRCST) ISSN: 2347-5552, Volume-2, Issue-6, November-2014
7) Yongkun Li, Member, IEEE, and John C. S. Lui, Fellow, IEEE, “Friends or Foes: Distributed and RandomizedAlgorithms to Determine DishonestRecommenders in OnlineSocial Networks”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 10, OCTOBER 2014
8) Manreet kaur, Monika Bharti, “Fog Computing Providing Data Security: A Review”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 6, June 2014
9) Divya Shrungar J, Priya M P, Asha S M, “Fog Computing: Security in Cloud Environment”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 8, August 2015
10) Younghee Park, Salvatore J. Stolfo, “Software Decoys for Insider Threat”, ACM 2012
11) Miss. Shafiyana Sayyad, Mr.Anil Bhandare, Mr. Deepak Yelwande, “Fog Computing:Software decoys for insider threat”, Volume 2 issue 3 March 2015
12) Tom H. Longxiang Gao, Yang Xiang, Zhi Li, Limin Sun, “Fog Computing: Focusing on Mobile Users at the Edge” 6 Feb 2015
13) Flavio Bonomi, Rodolfo Milito, Jiang Zhu, Sateesh Addepalli, “Fog Computing nd Its Role in the Internet of Things”, ACM 2012
14) Manreet Kaur, monika Bharati, “Securing user data on cloud using Fog Computing and Decoy technique”, Volume 2, Issue 10, October 2014