Fog Computing : Providing Data Security to the Cloud

Authors(6) :-Prof. Abhijit Pande, Akshay Kawale, Avinash Padoliya, Mrunal Chaple, Pranay Gakare, Rohit Wankar

Cloud computing is to significantly change the way we use computers and access and store our personal and business information. Nowadays, security and privacy both are main concern that needed to be considered. In an existing system the data protection mechanism such as encryption was failed in securing the data from the attacker it does not verify weather is the user was authorized or not so We propose a different approach for securing data in the cloud using user behavioral and decoy technology This protects against the misuse of the user’s real data that we have come to call fog computing.

Authors and Affiliations

Prof. Abhijit Pande
Department of Computer Technology, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
Akshay Kawale
Department of Computer Technology, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
Avinash Padoliya
Department of Computer Technology, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
Mrunal Chaple
Department of Computer Technology, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
Pranay Gakare
Department of Computer Technology, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
Rohit Wankar
Department of Computer Technology, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India

Advance User Behavioral, Hybrid Decoy Technology.

  1. Claycomb, W. R. (2012) "Connected vehicles, the internet of things, and fog computing," in The Eighth ACM International Workshop on Vehicular Inter-  Networking (VANET), Las Vegas, USA, 2011.
  2. Salvatore J. Stoflio, "Fog computing and its role in the internet of things," in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC'12. ACM, 2012, pp. 13-16.
  3. Kaufman L. et al. (2009), "A view of cloud computing," Commun. ACM, vol. 53, no. 4,  pp. 50-58, Apr 2010.Σ Park, Y. Et al. (2012), "On optimally reducing power loss in micro-grids with power storage devices," IEEE Journal of Selected Areas in Communications, 2014 to appear.
  4. Madsen.H and Albeanu, "The internet of things: A survey," Comput. Netw, vol. 54, no. 15, pp. 2787-2805, Oct. 2010.

Publication Details

Published in : Volume 3 | Issue 2 | January-February 2017
Date of Publication : 2017-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 341-344
Manuscript Number : NCAEAS2354
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

Prof. Abhijit Pande, Akshay Kawale, Avinash Padoliya, Mrunal Chaple, Pranay Gakare, Rohit Wankar , " Fog Computing : Providing Data Security to the Cloud, International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 3, Issue 2, pp.341-344, January-February-2017. Available at doi : 10.32628/NCAEAS2354
Journal URL : http://ijsrst.com/NCAEAS2354

Article Preview

Follow Us

Contact Us