Vous êtes sur la page 1sur 11

FOG COMPUTING:

MITIGATING INSIDER DATA


THEFT ATTACKS IN THE CLOUD

Presented by
P.Pamuleti,
Reg.No:10091F0025

Under the guidance of


Mrs .C. Lakshmi, MCA
Asst . Prof in CSE.

CONTENTS
Introduction
Literature

survey
Project Objective
Methodology
Existing System

INTRODUCTION

Cloud is a subscription based service.

Cloud computing is a shared pool of resources.

The way of use computers and store our personal and business information can
arises new data security challenges.

Encryption mechanisms are not protect the data in the cloud from unauthorized
access.

A different way for securing the data in the cloud by using offensive decoy
technology called as Fog Computing.

This protects the users data in the cloud.

LITERATURE SURVEY

Literature review is a survey of already existing data on a given topic to


access the relevant information to develop the proposed project.

This is a process of reading, analyzing, evaluating, and summarizing the


materials about the specific topic.

IN 2009

We have our own confidential documents in the cloud. This files does not
have much security.

So, hacker gains access the documents.

Twitter incident is one example of a data theft attack in the Cloud.

Difficult to find the attacker.

IN 2010

Cloud computing security was developed against attackers.

Finding of hackers in the cloud.

IN 2011

Showing a set of attacks that demonstrate how a malicious insider can easily obtain
passwords, cryptographic keys, files and other confidential data.

Prevent the accessing of passwords, keys and other information from the attacker.

Additionally, it shows that recent research results that might be useful to protect data
in the cloud.

PROJECT OBJECTIVE

A different way for securing the data in the cloud by using decoy technology
called as Fog Computing.

The decoy technology, serve two purposes:


(1) Validating whether data access is authorized.
(2) When abnormal information access is detected, confusing the
attacker with bogus information.

METHODOLOGY

By using decoy technology we store decoy documents in the Cloud along


the users real data .

Decoy documents are special type of documents which have some bogus
information such as medical reports, phone bills..etc.

Once, the user need to access the data , he will be verified by using security
questions.

If the user will be authorized person, then serve the exact information what
he wants otherwise the attacker will be confused with decoy documents.

EXITING SYSTEM

Existing data protection mechanisms such as encryption was failed in securing


the data from the attackers.

It does not verify whether the user was authorized or not.

Cloud computing security does not focus on ways of secure the data from
unauthorized access.

Encryption does not provide much security to our data.

Thank You

Vous aimerez peut-être aussi