Fog Computing : Providing Data Security to the Cloud
Keywords:
Advance User Behavioral, Hybrid Decoy Technology.Abstract
Cloud computing is to significantly change the way we use computers and access and store our personal and business information. Nowadays, security and privacy both are main concern that needed to be considered. In an existing system the data protection mechanism such as encryption was failed in securing the data from the attacker it does not verify weather is the user was authorized or not so We propose a different approach for securing data in the cloud using user behavioral and decoy technology This protects against the misuse of the user’s real data that we have come to call fog computing.
References
- Claycomb, W. R. (2012) "Connected vehicles, the internet of things, and fog computing," in The Eighth ACM International Workshop on Vehicular Inter- Networking (VANET), Las Vegas, USA, 2011.
- Salvatore J. Stoflio, "Fog computing and its role in the internet of things," in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC'12. ACM, 2012, pp. 13-16.
- Kaufman L. et al. (2009), "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50-58, Apr 2010.Σ Park, Y. Et al. (2012), "On optimally reducing power loss in micro-grids with power storage devices," IEEE Journal of Selected Areas in Communications, 2014 to appear.
- Madsen.H and Albeanu, "The internet of things: A survey," Comput. Netw, vol. 54, no. 15, pp. 2787-2805, Oct. 2010.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.