Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Fog computing provide security to data in cloud ppt

13,007 views

Published on

  • DOWNLOAD FULL BOOKS INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... 1.DOWNLOAD FULL PDF EBOOK here { https://tinyurl.com/y8nn3gmc } ......................................................................................................................... 1.DOWNLOAD FULL EPUB Ebook here { https://tinyurl.com/y8nn3gmc } ......................................................................................................................... 1.DOWNLOAD FULL doc Ebook here { https://tinyurl.com/y8nn3gmc } ......................................................................................................................... 1.DOWNLOAD FULL PDF EBOOK here { https://tinyurl.com/y8nn3gmc } ......................................................................................................................... 1.DOWNLOAD FULL EPUB Ebook here { https://tinyurl.com/y8nn3gmc } ......................................................................................................................... 1.DOWNLOAD FULL doc Ebook here { https://tinyurl.com/y8nn3gmc } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • https://cloudwebhostingtips.com/iot-project-internet-of-things-ideas-cloud-computing/
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • i saw a much Better PPT on ThesisScientist.com on the same Topic
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Fog computing provide security to data in cloud ppt

  1. 1. FOG COMPUTING
  2. 2. CONTENTS Abstract Existing System Disadvantages Proposed System Architecture Conclusion Future scope
  3. 3. ABSTRACT Fog computing is not a replacement of cloud it is just extends the cloud computing by providing security in the cloud environment. Cloud computing promises to significantly change the way of use computers and store our personal and business information can arises new data security challenges. Encryption mechanisms not protect the data in the cloud from unauthorized access.  We proposed a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns.
  4. 4. EXISTING SYSTEM  In Existing data protection mechanisms such as encryption was failed in securing the data from the attacker. It does not verify whether the user was authorized or not.  Cloud computing security does not focus on ways of secure the data from unauthorized access. In 2009 we have our own confidential documents in the cloud. This file does not have much security. so, hacker gains access the documents. Twitter incident is one example of a data theft attack in the Cloud.
  5. 5. DISADVANTAGES No body is identified when the attack is happen. It is complex to detect which user is attack. We can not detect which file was hacking.
  6. 6. PROPOSED SYSTEM We proposed a completely new technique to secure user’s data in cloud using user behavior and Decay information technology called as fog computing.  In this technique when the unauthorized person try to access the data of the real user the system generates the fake documents in such a way that the unauthorized person was also not able to identify the data is fake or real
  7. 7. USER BEHAVIOR PROFILING Admin monitor data access in the cloud and notice abnormal data access patterns User profiling will a well known Technique that can be applied here to check how, when, and how much a client access their data in the Cloud.  This method of behavior based security will regularly used in scheme uncovering applications.
  8. 8. DECOY SYSTEM We suggest a different approach for securing data in the cloud using nasty decoy technology.  We monitor data access in the cloud and sense irregular data access patterns. We use this technology to begin disinformation attacks against malicious insiders, preventing them from distinguishing the valid aware customer data from bogus useless.
  9. 9. DECOY SYSTEM
  10. 10. DECOY SYSTEM ADVANTAGES The decoys, then, serve two purpose Validating whether data access is authorized when abnormal information access is detected.  Confusing the attacker with bogus information
  11. 11. ARCHITECTURE
  12. 12. CONCLUSION The system was developed only with email provision but we have also implemented the SMS technique. In Fog Computing we presenting a new approach for solving the problem of insider data theft attacks in a cloud using dynamically generated decoy files and also saving storage required for maintaining decoy files in the cloud. So by using decoy technique in Fog can minimize insider attacks in cloud..
  13. 13. FUTURE SCOPE In our future work, this security system as we have explained is applicable only for single cloud ownership system. If the cloud owner has a more than one clouds to operate then our security system will not be applicable for providing security, therefore in the future enhancement we can enhance our existing application to manage a cloud environment which has more than one cloud architecture.  Cloud computing is the future for organizations.

×