SlideShare a Scribd company logo
1 of 15
FOG COMPUTING
CONTENTS
Abstract
Existing System
Disadvantages
Proposed System
Architecture
Conclusion
Future scope
ABSTRACT
Fog computing is not a replacement of cloud it is just extends
the cloud computing by providing security in the cloud
environment.
Cloud computing promises to significantly change the way of
use computers and store our personal and business information
can arises new data security challenges. Encryption
mechanisms not protect the data in the cloud from unauthorized
access.
 We proposed a different approach for securing data in the cloud
using offensive decoy technology. We monitor data access in
the cloud and detect abnormal data access patterns.
EXISTING SYSTEM
 In Existing data protection mechanisms such as encryption was
failed in securing the data from the attacker. It does not verify
whether the user was authorized or not.
 Cloud computing security does not focus on ways of secure the
data from unauthorized access.
In 2009 we have our own confidential documents in the cloud.
This file does not have much security. so, hacker gains access
the documents. Twitter incident is one example of a data theft
attack in the Cloud.
DISADVANTAGES
No body is identified when the attack is happen.
It is complex to detect which user is attack.
We can not detect which file was hacking.
PROPOSED SYSTEM
We proposed a completely new technique to secure user’s
data in cloud using user behavior and Decay information
technology called as fog computing.
 In this technique when the unauthorized person try to access
the data of the real user the system generates the fake
documents in such a way that the unauthorized person was
also not able to identify the data is fake or real
USER BEHAVIOR PROFILING
Admin monitor data access in the cloud and notice
abnormal data access patterns User profiling will a well
known Technique that can be applied here to check
how, when, and how much a client access their data in
the Cloud.
 This method of behavior based security will regularly
used in scheme uncovering applications.
DECOY SYSTEM
We suggest a different approach for securing data in
the cloud using nasty decoy technology.
 We monitor data access in the cloud and sense
irregular data access patterns.
We use this technology to begin disinformation
attacks against malicious insiders, preventing them
from distinguishing the valid aware customer data
from bogus useless.
DECOY SYSTEM
DECOY SYSTEM ADVANTAGES
The decoys, then, serve two purpose
Validating whether data access is authorized when
abnormal information access is detected.
 Confusing the attacker with bogus information
ARCHITECTURE
CONCLUSION
The system was developed only with email provision
but we have also implemented the SMS technique. In
Fog Computing we presenting a new approach for
solving the problem of insider data theft attacks in a
cloud using dynamically generated decoy files and also
saving storage required for maintaining decoy files in
the cloud. So by using decoy technique in Fog can
minimize insider attacks in cloud..
FUTURE SCOPE
In our future work, this security system as we have
explained is applicable only for single cloud ownership
system. If the cloud owner has a more than one clouds to
operate then our security system will not be applicable for
providing security, therefore in the future enhancement
we can enhance our existing application to manage a
cloud environment which has more than one cloud
architecture.
 Cloud computing is the future for organizations.
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt

More Related Content

What's hot (20)

Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog ppt
Fog pptFog ppt
Fog ppt
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog computing
Fog computing Fog computing
Fog computing
 

Viewers also liked

Big Data at DYNO
Big Data at DYNOBig Data at DYNO
Big Data at DYNOTu Pham
 
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUlf Mattsson
 
Cloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksCloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksMichael Yung
 
Disadvantages of Cloud Computing
Disadvantages of Cloud ComputingDisadvantages of Cloud Computing
Disadvantages of Cloud ComputingMaikel Mardjan
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on CloudTu Pham
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEXAngelo Corsaro
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with FogAchu Anna
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 

Viewers also liked (20)

Big Data at DYNO
Big Data at DYNOBig Data at DYNO
Big Data at DYNO
 
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
 
Cloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksCloud Computing - Benefits and Risks
Cloud Computing - Benefits and Risks
 
Disadvantages of Cloud Computing
Disadvantages of Cloud ComputingDisadvantages of Cloud Computing
Disadvantages of Cloud Computing
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
Face detection issues
Face detection issuesFace detection issues
Face detection issues
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Similar to Fog computing provide security to data in cloud ppt

Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudIJSRD
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computingeSAT Publishing House
 
seminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptxseminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptxPrasannaKumarpanda2
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxchWaqasZahid
 
Exploring Cloud Encryption
Exploring Cloud EncryptionExploring Cloud Encryption
Exploring Cloud EncryptionSamuel Borthwick
 

Similar to Fog computing provide security to data in cloud ppt (20)

Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
 
FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
project 11
project 11project 11
project 11
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
Fog doc
Fog doc Fog doc
Fog doc
 
Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computing
 
seminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptxseminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptx
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Exploring Cloud Encryption
Exploring Cloud EncryptionExploring Cloud Encryption
Exploring Cloud Encryption
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 

More from priyanka reddy

More from priyanka reddy (6)

Cyborg techseminar
Cyborg techseminarCyborg techseminar
Cyborg techseminar
 
3 d searching document
3 d searching document3 d searching document
3 d searching document
 
Mirror doc
Mirror docMirror doc
Mirror doc
 
Mirror link
Mirror linkMirror link
Mirror link
 
5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor
 
E ball technology ppt
E ball technology pptE ball technology ppt
E ball technology ppt
 

Fog computing provide security to data in cloud ppt

  • 3. ABSTRACT Fog computing is not a replacement of cloud it is just extends the cloud computing by providing security in the cloud environment. Cloud computing promises to significantly change the way of use computers and store our personal and business information can arises new data security challenges. Encryption mechanisms not protect the data in the cloud from unauthorized access.  We proposed a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns.
  • 4. EXISTING SYSTEM  In Existing data protection mechanisms such as encryption was failed in securing the data from the attacker. It does not verify whether the user was authorized or not.  Cloud computing security does not focus on ways of secure the data from unauthorized access. In 2009 we have our own confidential documents in the cloud. This file does not have much security. so, hacker gains access the documents. Twitter incident is one example of a data theft attack in the Cloud.
  • 5. DISADVANTAGES No body is identified when the attack is happen. It is complex to detect which user is attack. We can not detect which file was hacking.
  • 6. PROPOSED SYSTEM We proposed a completely new technique to secure user’s data in cloud using user behavior and Decay information technology called as fog computing.  In this technique when the unauthorized person try to access the data of the real user the system generates the fake documents in such a way that the unauthorized person was also not able to identify the data is fake or real
  • 7. USER BEHAVIOR PROFILING Admin monitor data access in the cloud and notice abnormal data access patterns User profiling will a well known Technique that can be applied here to check how, when, and how much a client access their data in the Cloud.  This method of behavior based security will regularly used in scheme uncovering applications.
  • 8. DECOY SYSTEM We suggest a different approach for securing data in the cloud using nasty decoy technology.  We monitor data access in the cloud and sense irregular data access patterns. We use this technology to begin disinformation attacks against malicious insiders, preventing them from distinguishing the valid aware customer data from bogus useless.
  • 10. DECOY SYSTEM ADVANTAGES The decoys, then, serve two purpose Validating whether data access is authorized when abnormal information access is detected.  Confusing the attacker with bogus information
  • 12. CONCLUSION The system was developed only with email provision but we have also implemented the SMS technique. In Fog Computing we presenting a new approach for solving the problem of insider data theft attacks in a cloud using dynamically generated decoy files and also saving storage required for maintaining decoy files in the cloud. So by using decoy technique in Fog can minimize insider attacks in cloud..
  • 13. FUTURE SCOPE In our future work, this security system as we have explained is applicable only for single cloud ownership system. If the cloud owner has a more than one clouds to operate then our security system will not be applicable for providing security, therefore in the future enhancement we can enhance our existing application to manage a cloud environment which has more than one cloud architecture.  Cloud computing is the future for organizations.