Handling Attacks by Implementation of Fog Computing |
Author(s): |
| Ashwini Barik , GHRIET pune-412207; Amit Dighe, GHRIET pune; Akshay Pawar, GHRIET pune; Prasad Yewale, GHRIET Pune; Ms. Rekha Jadhav |
Keywords: |
| FOG Computing, Disinformation Attack, Cloud |
Abstract |
|
“This is move first, Cloud first world and, Everything is becoming digital and software drivenâ€, the statement was first issued by Mr. Satya Nadella when he was appointed CEO of Microsoft. As being stated to be true It is definitely a cloud driven world. Where you mange most of your resources by incorporating with the cloud. But having a cloud or being a part of cloud also involves how you access the resources from cloud. How transparent your cloud in accessing the resources is also play an important role in adding valuation to it. Existing data security mechanisms such as encryption, entrusted third party auditor have failed in preventing masquerade attacks, especially those by an insider to the cloud provider. We propose a different method for securing data in the cloud using decoy or bogus files. We keep track of file access in the cloud and detect anomalous data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. |
Other Details |
|
Paper ID: IJSRDV3I40264 Published in: Volume : 3, Issue : 4 Publication Date: 01/07/2015 Page(s): 385-387 |
Article Preview |
|
|
|
|
