FOG COMPUTING:
MITIGATING INSIDER DATA
THEFT ATTACKS IN THE CLOUD
Presented by
[Link],
[Link]:10091F0025
Under the guidance of
Mrs .C. Lakshmi, MCA
Asst . Prof in CSE.
CONTENTS
Introduction
Literature
survey
Project Objective
Methodology
Existing System
INTRODUCTION
Cloud is a subscription based service.
Cloud computing is a shared pool of resources.
The way of use computers and store our personal and business information can
arises new data security challenges.
Encryption mechanisms are not protect the data in the cloud from unauthorized
access.
A different way for securing the data in the cloud by using offensive decoy
technology called as Fog Computing.
This protects the users data in the cloud.
LITERATURE SURVEY
Literature review is a survey of already existing data on a given topic to
access the relevant information to develop the proposed project.
This is a process of reading, analyzing, evaluating, and summarizing the
materials about the specific topic.
IN 2009
We have our own confidential documents in the cloud. This files does not
have much security.
So, hacker gains access the documents.
Twitter incident is one example of a data theft attack in the Cloud.
Difficult to find the attacker.
IN 2010
Cloud computing security was developed against attackers.
Finding of hackers in the cloud.
IN 2011
Showing a set of attacks that demonstrate how a malicious insider can easily obtain
passwords, cryptographic keys, files and other confidential data.
Prevent the accessing of passwords, keys and other information from the attacker.
Additionally, it shows that recent research results that might be useful to protect data
in the cloud.
PROJECT OBJECTIVE
A different way for securing the data in the cloud by using decoy technology
called as Fog Computing.
The decoy technology, serve two purposes:
(1) Validating whether data access is authorized.
(2) When abnormal information access is detected, confusing the
attacker with bogus information.
METHODOLOGY
By using decoy technology we store decoy documents in the Cloud along
the users real data .
Decoy documents are special type of documents which have some bogus
information such as medical reports, phone bills..etc.
Once, the user need to access the data , he will be verified by using security
questions.
If the user will be authorized person, then serve the exact information what
he wants otherwise the attacker will be confused with decoy documents.
EXITING SYSTEM
Existing data protection mechanisms such as encryption was failed in securing
the data from the attackers.
It does not verify whether the user was authorized or not.
Cloud computing security does not focus on ways of secure the data from
unauthorized access.
Encryption does not provide much security to our data.
Thank You