Académique Documents
Professionnel Documents
Culture Documents
Presented by
P.Pamuleti,
Reg.No:10091F0025
CONTENTS
Introduction
Literature
survey
Project Objective
Methodology
Existing System
INTRODUCTION
The way of use computers and store our personal and business information can
arises new data security challenges.
Encryption mechanisms are not protect the data in the cloud from unauthorized
access.
A different way for securing the data in the cloud by using offensive decoy
technology called as Fog Computing.
LITERATURE SURVEY
IN 2009
We have our own confidential documents in the cloud. This files does not
have much security.
IN 2010
IN 2011
Showing a set of attacks that demonstrate how a malicious insider can easily obtain
passwords, cryptographic keys, files and other confidential data.
Prevent the accessing of passwords, keys and other information from the attacker.
Additionally, it shows that recent research results that might be useful to protect data
in the cloud.
PROJECT OBJECTIVE
A different way for securing the data in the cloud by using decoy technology
called as Fog Computing.
METHODOLOGY
Decoy documents are special type of documents which have some bogus
information such as medical reports, phone bills..etc.
Once, the user need to access the data , he will be verified by using security
questions.
If the user will be authorized person, then serve the exact information what
he wants otherwise the attacker will be confused with decoy documents.
EXITING SYSTEM
Cloud computing security does not focus on ways of secure the data from
unauthorized access.
Thank You