A STUDY ON FOG COMPUTING

Authors

  • Mamatha Elsa Punnen Department of Computer Science, Saintgits College of Engineering (Autonomous), Kottayam, Pathamuttom, Kerala, India. Author
  • Sijo Cherian Department of Computer Science, Saintgits College of Engineering (Autonomous), Kottayam, Pathamuttom, Kerala, India Author

Keywords:

Cloud Computing, Data Theft, Decoy Technology

Abstract

In the modern world, cloud computing has become an unavoidable technology. Cloud computing enables multiple users to share their common resources and to store their personal and business information and access them. Although cloud provides an easy way for accessing, managing and computation of user data but it has some security risks such as data loss, hacking account, insider attacks etc. So the data in the cloud should be protected. For providing security, Fog computing has been introduced through which data can be secured. Fog computing extends cloud computing by giving security to the data and services to the edges of the network. An offensive decoy technology is used in this and the data access in the cloud is checked and the abnormal data access patterns are found.

References

Stolfo, Salvatore J., Malek Ben Salem, and Angelos D. Keromytis. ”Fog computing: Mitigating insider data theft attacks in the cloud.” Security and Privacy Workshops (SPW), 2012 IEEE Symposium on. IEEE, 2012.

Sayali Raje et al. Cloud Security using Fog Computing, Proceedings of IRF International Conference, 30 March 2014.

Cloud Security Alliance, “Top Threat to Cloud Computing v1.0”, March 2010.

Bonomi, Flavio, et al. ”Fog Computing and its Role in the Internet of Things.” Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. ACM, 2012, pp. 13-16.

Sonali Khairnar, Dhanashree Borkar, Fog Computing: A New Concept to Minimize the Attacks and to Provide Security in Cloud Computing Environment, IJRET, Vol 3 Issue :06.

Kaufman L. M, Data Security in the World of Cloud Computing Security and Privacy, IEEE, 2009, 61-64.

G. Dileep Kumar, Kolla Morarjee, Survey on Insider Data Theft Misuse Attacks in the Cloud, International Journal of Computer Science and Mobile Applications, Vol.2 Issue 2, February 2014.

Sabahi, F. Cloud Computing Security Threats and Responses, In Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on (2011, May),(pp. 245-249).

D. Godoy and A. Amandi, User Profiling in Personal Information Agents: A Survey, Knowl. Eng. Rev., Vol. 20, No. 4, pp. 329361, Dec. 2005.

Park Y and Stolfo, S. J. Software decoys for Insider Threat, In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, 2012, May, (pp. 93-94).

Madsen, Henrik, et al. “Reliability in the Utility Computing Era: Towards Reliable Fog Computing.” Systems, Signals and Image Processing (IWSSIP), 2013 20th International Conference on. IEEE, 2013.

F. Rocha and M. Correia, Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud, in Proceedings of the First International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments, Hong Kong, ser. DCDV 11, June 2011.

D.C. Saste et al, FOG COMPUTING: Comprehensive Approach for Avoiding Data Theft Attack Using Decoy Technology, Int. J. Computer Technology and Applications, Volume 5(5), 1768-1771.

Downloads

Published

2016-06-20

How to Cite

Mamatha Elsa Punnen, & Sijo Cherian. (2016). A STUDY ON FOG COMPUTING. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY (IJRCAIT), 4(3), 57-60. https://ijrcait.com/index.php/home/article/view/IJRCAIT_04_03_011