SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 427 
HINDERING DATA THEFT ATTACK THROUGH FOG COMPUTING Arbat Rashmi Vinod1, Bhalke Sumit Sunildatta2, Kumari Uma Rani3, Pillai Preethy Sasidharan4 1Computer, AISSMS COE, Maharashtra, India 2Computer, AISSMS COE, Maharashtra, India 3Computer, AISSMS COE, Maharashtra, India 4Computer, AISSMS COE, Maharashtra, India Abstract Fog computing is a paradigm that extends cloud computing which has become a reality that paved the way for new model of computing. Also fog provides application services to end terminal in the age of network. The inner data stealing attacks in which a user of a system illegitimately poses as the identity of another legitimate user which is an arising new challenge to the service provider where cloud service provider may not be able to protect the data. So to secure the real user’s sensitive information form the attacker in the cloud. We are proposing a completely distinct approach with the help of offensive decoy information technology, which is used for validating whether the data access is authorized where abnormal information is detected and thereby confusing the attacker with the bogus information. Keywords: Fog computing, Decoy information, User behavior profiling. 
--------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Cloud computing is nothing but computing power which is virtualized and through platform-agnostics delivery of storage infrastructures of abstracted hardware and internet software. The shared, on-demand IT resources, are created and disposed of effectively, are dynamically scalable through a variety of programmatic interfaces and cloud computing is a general term for anything that involves delivery hosted services over `the internet. Cloud is being used in various deployment models and service models. Out of these 3 service models, the bottom layer is infrastructure as a service (IaaS) provides virtual machines and other resources like block and file storage, network security, load balancing, virtual local area networks (VLANs) etc. The second layer form the bottom is Platform as a service here, cloud service provider deliver a computing platform like operating system, execution environment (programming language), database and web servers. Some PaaS service providers like Windows Azure, Google AppEngine enable the computers and storage resources vary automatically to match application demand so that the cloud user dos not have to allocate resources manually. The last service model is a Software as a Service (SaaS),user are provided access to application software and databases. SaaS is something also called as “on demand service of software and is usually available on a pay-per-use basis. With this new computing and communication paradigms arise a new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing the data theft attack, especially those perpetrated by an insider to cloud provider. 
We propose a completely different approach to securing the cloud using the decoy information technology that we have come to call Fog computing. Such as Twitter attack, by deploying decoy information within a Cloud by the Cloud service customer and within personal online social networking profiles by individual users. We use this technology to launch disinformation attacks against malicious Associates, preventing them from distinguishing the real sensitive customer data from fake worthless data. 2. DATA THEFT A very high and workable servicing is given to the business organizations, which for their secured data trust the providers of the cloud services. But this work is not as simpler to do in case of private services of cloud, as simpler it sounds. One of the major attacks in cloud is data theft. For Example, a series of cyber-attacks striking major banks as believed by U.S. officials, were the work of Iranian government to escalate cyber security standoff between the two nations. By infecting data centers at clouds instead of computers, the hackers obtained the computing power to mount enormous denial of service attacks. Thus, to limit the attacks of this kind we can reduce the value of the data which is being stored on the cloud. 3. SECURING CLOUD THROUGH FOG For securing data of cloud, none out of all the proposed methods is full proof due to various reasons. Let it be standard access or the encryption mechanism being used for securing cloud, they have failed because a cloud‟s reliable environment only, is not enough for the customer. Nowadays, the customer requires security which is healthy for its applications and data. So such incidences must also be dealt with. If we decrease the value of stolen data by providing decoy documents then we can limit the harm of the system.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 428 
Following features of extra security are proposed: 3.1 Profiled Behavior of User It would be very hard, if appropriately defined to impersonate the behaviour of any user. But the problem is its turning out really hard to define the behaviour of a user. It is absolutely necessary that there should be a way so that we can automatically process the behaviour of the user to avoid the Insider Misuse Problem. Currently even in case of malicious insider the data is accessed normally from the cloud as the insider is having the identity of the victim. User profiling (the well-known technique) should be used for detecting the illegitimate access. Here for legitimate users the admin will be easily able to set working baseline going to record log record of all users. To detect about user behaviour‟s abnormal access the admin can keep a constant eye on „Normal user' behaviour. Basically for applications of fraud detection this security method based on behaviour can be commonly used. Volumetric information such as the number of documents, their frequency of being read would naturally be used. We analyse for such type search behaviour which is dissimilar with that of actual user that exhibits deviation from the users threshold limit that has standby anomaly detect. 3.2. Decoy Decoy means the relative disinformation, bogus information about the related data documents. If it gets suspicious then to mislead the attacker false information is being released after the user search modelling. For making sure that the attacker fails to differentiate between the decoy files and the actual files the same database is used for both decoy as well as original file. There is direct linking to fog computing sites in case the attack on user‟s data is continued by the attacker. Through this the safety of the important data is increased. The actual user will now identify if the bogus data is being sent by the cloud as he is the owner of the data. Thus through a large number of means the response by the cloud can be altered , such as challenge questions to inform the cloud security system about its unauthorized and incorrect access. 4. MERGING USER BEHAVIOUR AND DECOY 
The current logged in user access behavior is compared with the past behavior of the user. If it is exceeding the threshold value or a limit, then the remote user is suspected to be anomaly. If the current user behavior is as the past behavior, the user is allowed to operate on the original data. The correlation of search behavior anomaly detection with trap based decoy files should provide stronger evidence of malfeasance, and therefore improve a detector‟s accuracy. This scenario covers the threat model of illegitimate access to Cloud data. Furthermore, an accidental opening of a decoy file by a legitimate user might be recognized as an accident if the search behavior is not deemed abnormal. Combining the two techniques improves detection accuracy. Instead, we made sure that the decoys were conspicuous enough for the attacker to access them if they were indeed trying to steal information by placing them in highly conspicuous directories and by giving them enticing names. 
5. CONCLUSION 
In this paper, by combining user search behaviour and decoy information we presented an integrated detection approach through anomaly detection with a baiting approach based on the deployment of decoy documents to secure personal and business data in the cloud. In our future work, this security system as we have explained is applicable only for single cloud ownership system. If the cloud owner has a more than one clouds to operate then our security system will not be applicable for providing security, therefore in the future enhancement we can enhance our existing application to manage a cloud environment which has more than one cloud architecture. Cloud computing is the future for organizations. REFERENCES [1]. M. Ben-Salem and S. J. Stolfo, “Modeling user search- behavior for masquerade detection,” in Proceedings of the 14th International Sympo- sium on Recent Advances in Intrusion Detection. Heidelberg: Springer, September 2011, pp. 1–20. [2]. B. M. Bowen and S. Hershkop, “Decoy Document Distributor: ht t p ://sneaker s .cs.columbia.ed u/ids/fog/,”2009. [Online]. Ava ilable: http : / /sneakers.cs.columbia.ed u /ids/FOG/ [3]. M. A. Maloof and G. D. Stephens, “elicit: A system for detecting insiders who violate need-to-know,” in RAID, 2007, pp. 146–166. [4]. R. Baeza-Yates, C. Hurtado, M. Mendoza, and G. Dupret, “Modeling user search behavior,” in LA-WEB ‟05: Proceedings of the Third Latin American Web Congress. IEEE Computer Society, 2005, pp. 242–251. [5]. J. Attenberg, S. Pandey, and T. Suel, “Modeling and predicting user behavior in sponsored search,” in KDD ‟09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. New York, NY, USA: ACM, 2009, pp. 1067–1076. [6]. B. M. Bowen, S. Hershkop, A. D. Keromytis, and S. J. Stolfo, “Baiting inside attackers using decoy documents,” in SecureComm‟09: Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks, 2009. [7]. Fog Computing: Mitigating Insider Data Theft Attacks in the / Cloud. [Online].Available:http://ids.cs.columbia.edu/sites/default/files/Fog_Computing_Position_Paper_WRIT_2012.pdf [8]. Lucky Nkosi, Paul Tarwireyi and Matthew O Adigun “Insider Threat Detection Model for the Cloud”, 978-1- 4799-0808-0/13/$31.00 ©2013 IEEE.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 429 
BIOGRAPHIES 
Arbat Rashmi Vinod is pursuing Bachelor‟s degree in Computer Engineering from Savitribai Phule Pune University from A.I.S.S.M.S College of Engineering, Pune, Maharashtra, India. 
Bhalke Sumit Sunildatta is pursuing Bachelor‟s degree in Computer Engineering from Savitribai Phule Pune University from A.I.S.S.M.S College of Engineering, Pune, Maharashtra, India. 
Kumari Uma Rani is pursuing Bachelor‟s degree in Computer Engineering from Savitribai Phule Pune University from A.I.S.S.M.S College of Engineering, Pune, Maharashtra, India. 
Pillai Preethy Sasidharan is pursuing Bachelor‟s degree in Computer Engineering from Savitribai Phule Pune University from A.I.S.S.M.S College of Engineering, Pune, Maharashtra, India.

Contenu connexe

Tendances

Advanced Multi-Encryption Technique in Cloud Computing
Advanced Multi-Encryption Technique in Cloud ComputingAdvanced Multi-Encryption Technique in Cloud Computing
Advanced Multi-Encryption Technique in Cloud ComputingAM Publications
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
 
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Salam Shah
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueeSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingIJMER
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106IJRAT
 

Tendances (19)

Advanced Multi-Encryption Technique in Cloud Computing
Advanced Multi-Encryption Technique in Cloud ComputingAdvanced Multi-Encryption Technique in Cloud Computing
Advanced Multi-Encryption Technique in Cloud Computing
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
G017424448
G017424448G017424448
G017424448
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verification
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation technique
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
 

En vedette

Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
A software framework for dynamic modeling of dc motors at robot joints
A software framework for dynamic modeling of dc motors at robot jointsA software framework for dynamic modeling of dc motors at robot joints
A software framework for dynamic modeling of dc motors at robot jointseSAT Publishing House
 
Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...
Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...
Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...eSAT Publishing House
 
Design evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobileDesign evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobileeSAT Publishing House
 
Tools description for product development process management in food industries
Tools description for product development process management in food industriesTools description for product development process management in food industries
Tools description for product development process management in food industrieseSAT Publishing House
 
Design and development of mechanical power amplifier
Design and development of mechanical power amplifierDesign and development of mechanical power amplifier
Design and development of mechanical power amplifiereSAT Publishing House
 
Seismic response of reinforced concrete structure by using different bracing ...
Seismic response of reinforced concrete structure by using different bracing ...Seismic response of reinforced concrete structure by using different bracing ...
Seismic response of reinforced concrete structure by using different bracing ...eSAT Publishing House
 
Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authoritieseSAT Publishing House
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...eSAT Publishing House
 
Natural disasters vulnerability assessment of gondia district, maharashtra, i...
Natural disasters vulnerability assessment of gondia district, maharashtra, i...Natural disasters vulnerability assessment of gondia district, maharashtra, i...
Natural disasters vulnerability assessment of gondia district, maharashtra, i...eSAT Publishing House
 
Real time reservoir operation (validation phase)
Real time reservoir operation (validation phase)Real time reservoir operation (validation phase)
Real time reservoir operation (validation phase)eSAT Publishing House
 
Effect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniquesEffect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniqueseSAT Publishing House
 
Characterization of reusable software components for better reuse
Characterization of reusable software components for better reuseCharacterization of reusable software components for better reuse
Characterization of reusable software components for better reuseeSAT Publishing House
 
The effect of band engineering of semiconductors on
The effect of band engineering of semiconductors onThe effect of band engineering of semiconductors on
The effect of band engineering of semiconductors oneSAT Publishing House
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizereSAT Publishing House
 
Comparative assessment of noise levels in various laboratories and constructi...
Comparative assessment of noise levels in various laboratories and constructi...Comparative assessment of noise levels in various laboratories and constructi...
Comparative assessment of noise levels in various laboratories and constructi...eSAT Publishing House
 
Lv side distributed power factor correction system
Lv side distributed power factor correction systemLv side distributed power factor correction system
Lv side distributed power factor correction systemeSAT Publishing House
 
Green cast demonstration of innovative lightweight construction components ma...
Green cast demonstration of innovative lightweight construction components ma...Green cast demonstration of innovative lightweight construction components ma...
Green cast demonstration of innovative lightweight construction components ma...eSAT Publishing House
 
Enhancement of power quality by unified power quality conditioner with fuzzy ...
Enhancement of power quality by unified power quality conditioner with fuzzy ...Enhancement of power quality by unified power quality conditioner with fuzzy ...
Enhancement of power quality by unified power quality conditioner with fuzzy ...eSAT Publishing House
 

En vedette (20)

Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
A software framework for dynamic modeling of dc motors at robot joints
A software framework for dynamic modeling of dc motors at robot jointsA software framework for dynamic modeling of dc motors at robot joints
A software framework for dynamic modeling of dc motors at robot joints
 
Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...
Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...
Thermodynamic behavior of tetrahydrofuron in p dioxane, methylcyclohexane and...
 
Design evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobileDesign evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobile
 
Tools description for product development process management in food industries
Tools description for product development process management in food industriesTools description for product development process management in food industries
Tools description for product development process management in food industries
 
Design and development of mechanical power amplifier
Design and development of mechanical power amplifierDesign and development of mechanical power amplifier
Design and development of mechanical power amplifier
 
Seismic response of reinforced concrete structure by using different bracing ...
Seismic response of reinforced concrete structure by using different bracing ...Seismic response of reinforced concrete structure by using different bracing ...
Seismic response of reinforced concrete structure by using different bracing ...
 
Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authorities
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...
 
Natural disasters vulnerability assessment of gondia district, maharashtra, i...
Natural disasters vulnerability assessment of gondia district, maharashtra, i...Natural disasters vulnerability assessment of gondia district, maharashtra, i...
Natural disasters vulnerability assessment of gondia district, maharashtra, i...
 
Real time reservoir operation (validation phase)
Real time reservoir operation (validation phase)Real time reservoir operation (validation phase)
Real time reservoir operation (validation phase)
 
Effect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniquesEffect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniques
 
Quality of service (qos) in wi max
Quality of service (qos) in wi maxQuality of service (qos) in wi max
Quality of service (qos) in wi max
 
Characterization of reusable software components for better reuse
Characterization of reusable software components for better reuseCharacterization of reusable software components for better reuse
Characterization of reusable software components for better reuse
 
The effect of band engineering of semiconductors on
The effect of band engineering of semiconductors onThe effect of band engineering of semiconductors on
The effect of band engineering of semiconductors on
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
 
Comparative assessment of noise levels in various laboratories and constructi...
Comparative assessment of noise levels in various laboratories and constructi...Comparative assessment of noise levels in various laboratories and constructi...
Comparative assessment of noise levels in various laboratories and constructi...
 
Lv side distributed power factor correction system
Lv side distributed power factor correction systemLv side distributed power factor correction system
Lv side distributed power factor correction system
 
Green cast demonstration of innovative lightweight construction components ma...
Green cast demonstration of innovative lightweight construction components ma...Green cast demonstration of innovative lightweight construction components ma...
Green cast demonstration of innovative lightweight construction components ma...
 
Enhancement of power quality by unified power quality conditioner with fuzzy ...
Enhancement of power quality by unified power quality conditioner with fuzzy ...Enhancement of power quality by unified power quality conditioner with fuzzy ...
Enhancement of power quality by unified power quality conditioner with fuzzy ...
 

Similaire à Hindering data theft attack through fog computing

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
Implementation_of_User_Authentication_as
Implementation_of_User_Authentication_asImplementation_of_User_Authentication_as
Implementation_of_User_Authentication_asMasood Shah
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Publishing House
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Science international journal
Science international journalScience international journal
Science international journalSarita30844
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 

Similaire à Hindering data theft attack through fog computing (20)

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Implementation_of_User_Authentication_as
Implementation_of_User_Authentication_asImplementation_of_User_Authentication_as
Implementation_of_User_Authentication_as
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
A017130104
A017130104A017130104
A017130104
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Science international journal
Science international journalScience international journal
Science international journal
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 

Plus de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housingeSAT Publishing House
 

Plus de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housing
 

Dernier

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptbibisarnayak0
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate productionChinnuNinan
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Dernier (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.ppt
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate production
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

Hindering data theft attack through fog computing

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 427 HINDERING DATA THEFT ATTACK THROUGH FOG COMPUTING Arbat Rashmi Vinod1, Bhalke Sumit Sunildatta2, Kumari Uma Rani3, Pillai Preethy Sasidharan4 1Computer, AISSMS COE, Maharashtra, India 2Computer, AISSMS COE, Maharashtra, India 3Computer, AISSMS COE, Maharashtra, India 4Computer, AISSMS COE, Maharashtra, India Abstract Fog computing is a paradigm that extends cloud computing which has become a reality that paved the way for new model of computing. Also fog provides application services to end terminal in the age of network. The inner data stealing attacks in which a user of a system illegitimately poses as the identity of another legitimate user which is an arising new challenge to the service provider where cloud service provider may not be able to protect the data. So to secure the real user’s sensitive information form the attacker in the cloud. We are proposing a completely distinct approach with the help of offensive decoy information technology, which is used for validating whether the data access is authorized where abnormal information is detected and thereby confusing the attacker with the bogus information. Keywords: Fog computing, Decoy information, User behavior profiling. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Cloud computing is nothing but computing power which is virtualized and through platform-agnostics delivery of storage infrastructures of abstracted hardware and internet software. The shared, on-demand IT resources, are created and disposed of effectively, are dynamically scalable through a variety of programmatic interfaces and cloud computing is a general term for anything that involves delivery hosted services over `the internet. Cloud is being used in various deployment models and service models. Out of these 3 service models, the bottom layer is infrastructure as a service (IaaS) provides virtual machines and other resources like block and file storage, network security, load balancing, virtual local area networks (VLANs) etc. The second layer form the bottom is Platform as a service here, cloud service provider deliver a computing platform like operating system, execution environment (programming language), database and web servers. Some PaaS service providers like Windows Azure, Google AppEngine enable the computers and storage resources vary automatically to match application demand so that the cloud user dos not have to allocate resources manually. The last service model is a Software as a Service (SaaS),user are provided access to application software and databases. SaaS is something also called as “on demand service of software and is usually available on a pay-per-use basis. With this new computing and communication paradigms arise a new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing the data theft attack, especially those perpetrated by an insider to cloud provider. We propose a completely different approach to securing the cloud using the decoy information technology that we have come to call Fog computing. Such as Twitter attack, by deploying decoy information within a Cloud by the Cloud service customer and within personal online social networking profiles by individual users. We use this technology to launch disinformation attacks against malicious Associates, preventing them from distinguishing the real sensitive customer data from fake worthless data. 2. DATA THEFT A very high and workable servicing is given to the business organizations, which for their secured data trust the providers of the cloud services. But this work is not as simpler to do in case of private services of cloud, as simpler it sounds. One of the major attacks in cloud is data theft. For Example, a series of cyber-attacks striking major banks as believed by U.S. officials, were the work of Iranian government to escalate cyber security standoff between the two nations. By infecting data centers at clouds instead of computers, the hackers obtained the computing power to mount enormous denial of service attacks. Thus, to limit the attacks of this kind we can reduce the value of the data which is being stored on the cloud. 3. SECURING CLOUD THROUGH FOG For securing data of cloud, none out of all the proposed methods is full proof due to various reasons. Let it be standard access or the encryption mechanism being used for securing cloud, they have failed because a cloud‟s reliable environment only, is not enough for the customer. Nowadays, the customer requires security which is healthy for its applications and data. So such incidences must also be dealt with. If we decrease the value of stolen data by providing decoy documents then we can limit the harm of the system.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 428 Following features of extra security are proposed: 3.1 Profiled Behavior of User It would be very hard, if appropriately defined to impersonate the behaviour of any user. But the problem is its turning out really hard to define the behaviour of a user. It is absolutely necessary that there should be a way so that we can automatically process the behaviour of the user to avoid the Insider Misuse Problem. Currently even in case of malicious insider the data is accessed normally from the cloud as the insider is having the identity of the victim. User profiling (the well-known technique) should be used for detecting the illegitimate access. Here for legitimate users the admin will be easily able to set working baseline going to record log record of all users. To detect about user behaviour‟s abnormal access the admin can keep a constant eye on „Normal user' behaviour. Basically for applications of fraud detection this security method based on behaviour can be commonly used. Volumetric information such as the number of documents, their frequency of being read would naturally be used. We analyse for such type search behaviour which is dissimilar with that of actual user that exhibits deviation from the users threshold limit that has standby anomaly detect. 3.2. Decoy Decoy means the relative disinformation, bogus information about the related data documents. If it gets suspicious then to mislead the attacker false information is being released after the user search modelling. For making sure that the attacker fails to differentiate between the decoy files and the actual files the same database is used for both decoy as well as original file. There is direct linking to fog computing sites in case the attack on user‟s data is continued by the attacker. Through this the safety of the important data is increased. The actual user will now identify if the bogus data is being sent by the cloud as he is the owner of the data. Thus through a large number of means the response by the cloud can be altered , such as challenge questions to inform the cloud security system about its unauthorized and incorrect access. 4. MERGING USER BEHAVIOUR AND DECOY The current logged in user access behavior is compared with the past behavior of the user. If it is exceeding the threshold value or a limit, then the remote user is suspected to be anomaly. If the current user behavior is as the past behavior, the user is allowed to operate on the original data. The correlation of search behavior anomaly detection with trap based decoy files should provide stronger evidence of malfeasance, and therefore improve a detector‟s accuracy. This scenario covers the threat model of illegitimate access to Cloud data. Furthermore, an accidental opening of a decoy file by a legitimate user might be recognized as an accident if the search behavior is not deemed abnormal. Combining the two techniques improves detection accuracy. Instead, we made sure that the decoys were conspicuous enough for the attacker to access them if they were indeed trying to steal information by placing them in highly conspicuous directories and by giving them enticing names. 5. CONCLUSION In this paper, by combining user search behaviour and decoy information we presented an integrated detection approach through anomaly detection with a baiting approach based on the deployment of decoy documents to secure personal and business data in the cloud. In our future work, this security system as we have explained is applicable only for single cloud ownership system. If the cloud owner has a more than one clouds to operate then our security system will not be applicable for providing security, therefore in the future enhancement we can enhance our existing application to manage a cloud environment which has more than one cloud architecture. Cloud computing is the future for organizations. REFERENCES [1]. M. Ben-Salem and S. J. Stolfo, “Modeling user search- behavior for masquerade detection,” in Proceedings of the 14th International Sympo- sium on Recent Advances in Intrusion Detection. Heidelberg: Springer, September 2011, pp. 1–20. [2]. B. M. Bowen and S. Hershkop, “Decoy Document Distributor: ht t p ://sneaker s .cs.columbia.ed u/ids/fog/,”2009. [Online]. Ava ilable: http : / /sneakers.cs.columbia.ed u /ids/FOG/ [3]. M. A. Maloof and G. D. Stephens, “elicit: A system for detecting insiders who violate need-to-know,” in RAID, 2007, pp. 146–166. [4]. R. Baeza-Yates, C. Hurtado, M. Mendoza, and G. Dupret, “Modeling user search behavior,” in LA-WEB ‟05: Proceedings of the Third Latin American Web Congress. IEEE Computer Society, 2005, pp. 242–251. [5]. J. Attenberg, S. Pandey, and T. Suel, “Modeling and predicting user behavior in sponsored search,” in KDD ‟09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. New York, NY, USA: ACM, 2009, pp. 1067–1076. [6]. B. M. Bowen, S. Hershkop, A. D. Keromytis, and S. J. Stolfo, “Baiting inside attackers using decoy documents,” in SecureComm‟09: Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks, 2009. [7]. Fog Computing: Mitigating Insider Data Theft Attacks in the / Cloud. [Online].Available:http://ids.cs.columbia.edu/sites/default/files/Fog_Computing_Position_Paper_WRIT_2012.pdf [8]. Lucky Nkosi, Paul Tarwireyi and Matthew O Adigun “Insider Threat Detection Model for the Cloud”, 978-1- 4799-0808-0/13/$31.00 ©2013 IEEE.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 429 BIOGRAPHIES Arbat Rashmi Vinod is pursuing Bachelor‟s degree in Computer Engineering from Savitribai Phule Pune University from A.I.S.S.M.S College of Engineering, Pune, Maharashtra, India. Bhalke Sumit Sunildatta is pursuing Bachelor‟s degree in Computer Engineering from Savitribai Phule Pune University from A.I.S.S.M.S College of Engineering, Pune, Maharashtra, India. Kumari Uma Rani is pursuing Bachelor‟s degree in Computer Engineering from Savitribai Phule Pune University from A.I.S.S.M.S College of Engineering, Pune, Maharashtra, India. Pillai Preethy Sasidharan is pursuing Bachelor‟s degree in Computer Engineering from Savitribai Phule Pune University from A.I.S.S.M.S College of Engineering, Pune, Maharashtra, India.