FOG Computing: Preventing Insider Data Theft Attacks in Cloud Using User Behavior Profiling and Decoy Information Technology

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2016 by IJETT Journal
Volume-32 Number-7
Year of Publication : 2016
Authors : Gayatri Kalaskar, Purva Ratkanthwar, Prachi Jagadale, Bhagyashri Jagadale
DOI :  10.14445/22315381/IJETT-V32P266

Citation 

Gayatri Kalaskar, Purva Ratkanthwar, Prachi Jagadale, Bhagyashri Jagadale"FOG Computing: Preventing Insider Data Theft Attacks in Cloud Using User Behavior Profiling and Decoy Information Technology", International Journal of Engineering Trends and Technology (IJETT), V32(7),352-355 February 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Now a days, Cloud Computing plays very important role in the online world. In Cloud computing gives us significantly different ways of using computers to access our personal and business information. These new ways also arises some new challenges in security of cloud. Old techniques like data encryption have failed in preventing data theft where the perpetrator are insider to the cloud provider. We are proposing a new approach where data is secured by offensive decoy technology. We monitor different parameters of data access in cloud to detect data access patterns. When unauthorized data access is suspected and then verified by using challenge questions, we send large amount of decoy information to attacker. This decoy information prevents misuse of user’s real data.

 References

1) Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis, “Fog Computing: Mitigating Insider Data theft Attacks in Cloud” IEEE 2012
2) Ivan Stojmenovic, Sheng Wen, “The Fog Computing Paradigm: Scenarios andSecurity Issues” IEEE 2014
3) D. C. Saste, P. V. Madhwai, N. B. Lokhande, V. N. Chothe, “FOG COMPUTING: Comprehensive Approach for Avoiding Data Theft Attack Using Decoy Technology”, IJCTA | Sept-Oct 2014 Available This email address is being protected from spambots. You need JavaScript enabled to view it.
4) Thogaricheti Ashwini, Mrs. Anuradha.S.G, “Fog Computing to protect real and sensitivity information in Cloud”, IJECSE | SSN 2277-1956/V4N1-19-29
5) Shanhe Yi, Cheng Li, Qun Li, “A Survey of Fog Computing: Concepts, Applications andIssues, ACM 2015
6) Viraj G. Mandlekar, VireshKumar Mahale, Sanket S.Sancheti, Maaz S. Rais, “Survey on Fog Computing Mitigating Data TheftAttacks in C loud”, International Journal of Innovative Research in Computer Science & Technology (IJIRCST) ISSN: 2347-5552, Volume-2, Issue-6, November-2014
7) Yongkun Li, Member, IEEE, and John C. S. Lui, Fellow, IEEE, “Friends or Foes: Distributed and RandomizedAlgorithms to Determine DishonestRecommenders in OnlineSocial Networks”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 10, OCTOBER 2014
8) Manreet kaur, Monika Bharti, “Fog Computing Providing Data Security: A Review”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 6, June 2014
9) Divya Shrungar J, Priya M P, Asha S M, “Fog Computing: Security in Cloud Environment”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 8, August 2015
10) Younghee Park, Salvatore J. Stolfo, “Software Decoys for Insider Threat”, ACM 2012
11) Miss. Shafiyana Sayyad, Mr.Anil Bhandare, Mr. Deepak Yelwande, “Fog Computing:Software decoys for insider threat”, Volume 2 issue 3 March 2015
12) Tom H. Longxiang Gao, Yang Xiang, Zhi Li, Limin Sun, “Fog Computing: Focusing on Mobile Users at the Edge” 6 Feb 2015
13) Flavio Bonomi, Rodolfo Milito, Jiang Zhu, Sateesh Addepalli, “Fog Computing nd Its Role in the Internet of Things”, ACM 2012
14) Manreet Kaur, monika Bharati, “Securing user data on cloud using Fog Computing and Decoy technique”, Volume 2, Issue 10, October 2014

Keywords
Fog Computing, Decoy Security, Decoy Information Technology.