Fog Computing : Providing Data Security to the Cloud

Authors

  • Prof. Abhijit Pande  Department of Computer Technology, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
  • Akshay Kawale  Department of Computer Technology, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
  • Avinash Padoliya  Department of Computer Technology, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
  • Mrunal Chaple  Department of Computer Technology, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
  • Pranay Gakare  Department of Computer Technology, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
  • Rohit Wankar   Department of Computer Technology, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India

Keywords:

Advance User Behavioral, Hybrid Decoy Technology.

Abstract

Cloud computing is to significantly change the way we use computers and access and store our personal and business information. Nowadays, security and privacy both are main concern that needed to be considered. In an existing system the data protection mechanism such as encryption was failed in securing the data from the attacker it does not verify weather is the user was authorized or not so We propose a different approach for securing data in the cloud using user behavioral and decoy technology This protects against the misuse of the user’s real data that we have come to call fog computing.

References

  1. Claycomb, W. R. (2012) "Connected vehicles, the internet of things, and fog computing," in The Eighth ACM International Workshop on Vehicular Inter-  Networking (VANET), Las Vegas, USA, 2011.
  2. Salvatore J. Stoflio, "Fog computing and its role in the internet of things," in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC'12. ACM, 2012, pp. 13-16.
  3. Kaufman L. et al. (2009), "A view of cloud computing," Commun. ACM, vol. 53, no. 4,  pp. 50-58, Apr 2010.Σ Park, Y. Et al. (2012), "On optimally reducing power loss in micro-grids with power storage devices," IEEE Journal of Selected Areas in Communications, 2014 to appear.
  4. Madsen.H and Albeanu, "The internet of things: A survey," Comput. Netw, vol. 54, no. 15, pp. 2787-2805, Oct. 2010.

Downloads

Published

2017-02-28

Issue

Section

Research Articles

How to Cite

[1]
Prof. Abhijit Pande, Akshay Kawale, Avinash Padoliya, Mrunal Chaple, Pranay Gakare, Rohit Wankar , " Fog Computing : Providing Data Security to the Cloud, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 2, pp.341-344, January-February-2017.