SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________________ 
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 124 
FOG COMPUTING: A NEW CONCEPT TO MINIMIZE THE ATTACKS AND TO PROVIDE SECURITY IN CLOUD COMPUTING ENVIRONMENT Sonali Khairnar1, Dhanashree Borkar2 1M.E, Department of CSE, JSPM’s Imperial college of Engineering and Research, Maharashtra, India 2B.E, Department of CSE, JSPM’s Imperial college of Engineering and Research, Maharashtra, India Abstract Cloud is basically a clusters of multiple dedicated servers attached within a network .Cloud Computing is a network based environment that focuses on sharing computations or resources. In cloud customers only pay for what they use and have not to pay for local resources which they need such as storage or infrastructure. so this is the main advantage of cloud computing and main reason for gaining popularity in todays world .Also cloud computing is one of the most exciting technology due to its ability to reduce cost associated with computing while increasing flexibility and scalability for computer processes .But in cloud the main problem that occurs is security .And now a days security and privacy both are main concern that needed to be considered. To overcome the problem of security we are introducing the new technique which is called as Fog Computing .Fog Computing is not a replacement of cloud it is just extends the cloud computing by providing security in the cloud environment. With Fog services we are able to enhance the cloud experience by isolating users data that need to live on the edge. The main aim of fog computing is to place the data close to the end user. Keywords: Cloud, Cloud Computing, Decoys, Fog Computing. 
---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION In today's worlds the small as well as big -big organizations are using cloud computing technology to protect their data and to use the cloud resources as and when they need . Cloud is a subscription based service .Cloud computing is a shared pool of resources. The way of use computers and store our personal and business information can arises new data security challenges. Encryption mechanisms not protect the data in the cloud from unauthorized access. As we know that the traditional database system are usually deployed in closed environment where user can access the system only through a restricted network or internet. With the fast growth of W.W.W user can access virtually any database for which they have proper access right from anywhere in the world . By registering into cloud the users are ready to get the resources from cloud providers and the organization can access their data from anywhere and at any time when they need. But this comfortness comes with certain type of risk like security and privacy. To overcome by this problem we are using a new technique called as fog computing. Fog computing provides security in cloud environment in a greater extend to get the benefit of this technique a user need to get registered with the fog. once the user is ready by filling up the sign up form he will get the msg or email that he is ready to take the services from fog computing. 1.1 Existing System 
Existing data protection mechanisms such as encryption was failed in securing the data from the attackers. It does not verify whether the user was authorized or not. Cloud computing security does not focus on ways of secure the data from unauthorized access. Encryption does not provide much security to our data. In 2009 We have our own confidential documents in the cloud. This files does not have much security. So, hacker gains access the documents. Twitter incident is one example of a data theft attack in the Cloud. Difficult to find the attacker. In 2010 and 2011 Cloud computing security was developed against attackers. Finding of hackers in the cloud. Additionally, it shows that recent research results that might be useful to protect data in the cloud. 1.2 Proposed System We proposed a completely new technique to secure user‟s data in cloud using user behavior and decoy information technology called as Fog Computing. We use this techniques to provide data security in the cloud . A different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. In this technique when the unauthorized person try to access the data of the real user the system generates the fake documents in such a way that the unauthorized person was also not able to identify that the data is fake or real .It is identified thought a question which is entered by the real user at the time of filling the sign up form. If the answer of the question is wrong it means the user is not the real user and the system provide the fake document else original documents will be provided by the system to the real user.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________________ 
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 125 
2. SECURING CLOUDS USING FOG There are various ways to use cloud services to save or store files, documents and media in remote services that can be accessed whenever user connect to the Internet. The main problem in cloud is to maintain security for users data in way that guarantees only authenticated users and no one else gain access to that data. The issue of providing security to confidential information is core security problem, that it does not provide level of assurance most people desire. There are various methods to secure remote data in cloud using standard access control and encryption methods. It is good to say that all the standard approaches used for providing security have been demonstrated to fail from time to time for a variety of reasons, including faulty implementations, buggy code, insider attacks, mis- configured services, and the creative construction of effective and sophisticated attacks not envisioned by the implementers of security procedures. Building a secure and trustworthy cloud computing environment is not enough, because attacks on data continue to happen, and when they do, and information gets lost, there is no way to get it back. There is needs to get solutions to such accidents. The basic idea is that we can limit the damage of stolen data if we decrease the value of that stolen data to the attacker. We can achieve this through a „preventive‟ decoy (disinformation) attack. We can secure Cloud services by implementing given additional security features. 
2.1 Decoy System Decoy data, such as decoy documents, honeypots and other bogus information can be generated on demand and used for detecting unauthorized access to information and to „poison‟ the thief‟s ex-filtrated information. Serving decoys will confuse an attacker into believing they have ex-filtrated useful information, when they have not. This technology may be integrated with user behavior profiling technology to secure a user‟s data in the Cloud. . Whenever abnormal and unauthorized access to a cloud service is noticed, decoy information may be returned by the Cloud and delivered in such a waythat it appear completely normal and legitimate. The legitimate user, who is the owner of the information, would readily identify when decoy information is being returned by the Cloud, and hence could alter the Cloud‟s responses through a variety of means, such as challenge questions, to inform the Cloud security system that it has incorrectly detected an unauthorized access. In the case where the access is correctly identified as an unauthorized access, the Cloud security system would deliver unbounded amounts of bogus information to the attacker, thus securing the user‟s true data from can be implemented by given two additional security features: (1) validating whether data access is authorized when abnormal information access is detected, and (2) confusing the attacker with bogus information that is by providing decoy documents. 
Fig -1: Decoy System 
SystemUSERUSER PROFILINGATTACKER IDENTIFICATIONDECOY DOCUMENTORIGNAL DOCUMENT
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________________ 
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 126 
We have applied above concepts to detect unauthorized data access to data stored on a local file system by masqueraders, i.e. attackers who view of legitimate users after stealing their credentials. Our experimental results in a local file system setting show that combining both techniques can yield better detection results .This results suggest that this approach may work in a Cloud environment, to make cloud system more transparent to the user as a local file system. 3. FOG COMPUTING Fog Computing system is trying to work against the attacker specially malicious insider. Here malicious insider means Insider attacks can be performed by malicious employees at the providers or users site. Malicious insider can access the confidential data of cloud users. A malicious insider can easily obtain passwords, cryptographic keys and files. The threat of malicious attacks has increased due to lack of transparency in cloud providers processes and procedures . It means that a provider may not know how employees are granted access and how this access is monitored or how reports as well as policy compliances are analyzed. 
Fig -2: Architecture of Fog Computing 
Above fig. states the actual working of the fog computing .In two ways login is done in system that are admin login and user login .When admin login to the system there are again two steps to follow: step1:Enter username step2:Enter the password . After successful login of admin he can perform all admin related tasks, but while downloading any file from fog he have to answer the security Question if he answer it correctly then only original file can be download. 
In other case ,when admin or user answer incorrectly to the security question then decoy document (fake document) is provided to the fake user . Decoy technology work in the given manner if you have any word ,suppose “MADAM” in the document then some alphabets are replaced as M->A then the given word become “AADAA” which have no meaning. In some Case ,if attacker getting to know that „M‟ is replaced by „A‟ in the given document and by applying reverse engineering he get result as “MMDMM”. In any case he can‟t judge content of document. 
ADMINUSERLOGINSIGN UPLOGINADMIN OPERATIONSENTER USERNAMEENTER PASSWORDANSWER TO QUESTIONUPLOAD FILESVIEW MY FILESSEND MESSAGESEND MAILDOWNLOAD FILESSHARE FILEFOG COMPUTINGORIGNAL DOCUMENTSDECOY DOCUMENTS
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________________ 
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 127 
When user login to the system he also have to follow the same procedure as admin. Operations like upload files/documents, download files/documents, view alerts, send message, read message, broadcast any message all these can be perform by the user. ALERT this stream provide the detail knowledge of attack done on their personal file/document with details like date, time, no of times the attacker trying to hack that file/document .Best thing of fog Computing is after each successful login the user get SMS on the mobile that „login successful‟. from this the user get alert when other else trying to gain access to his/her personal fog account and when attacker trying to download some files/documents then user also get SMS that contain attacker ip-address, attacker‟s server name, date, time details on his/her mobile so that become easy to catch attacker by tracing all these things. In this way fog computing is more secure than the traditional cloud computing. 4. CONCLUSIONS The system was developed only with email provision but we have also implemented the SMS technique. In Fog Computing we presenting a new approach for solving the problem of insider data theft attacks in a cloud using dynamically generated decoy files and also saving storage required for maintaining decoy files in the cloud. So by using decoy technique in Fog can minimize insider attacks in cloud. REFERENCES [1]. Cloud Computing for Dummies [2]. Prevention Of Malicious Insider In The Cloud Using Decoy Documents by S. Muqtyar Ahmed, P. Namratha, C. Nagesh [3]. Cloud Security: Attacks and Current Defenses Gehana Booth, Andrew Soknacki, and Anil Somayaji [4]. Overview of Attacks on Cloud Computing by Ajey Singh, Dr. Maneesh Shrivastava 
BIOGRAPHIES 
Sonali Khairnar is lecturer of JSPM‟s Imperial College of Engineering and Research, Pune, MH, INDIA. She has received M.E Degree Computer Science and Engineering, Her main research interest includes Cloud Computing, Databases. 
Dhanashree Borkar is Student of JSPM‟s Imperial College of Engineering and Research, Pune, MH, INDIA. Currently appeared for B.E Degree Computer Science and Engineering, Her main research interest includes Cloud Computing and Fog Computing.

More Related Content

DOCX
Fog doc
DOCX
fog computing provide security to the data in cloud
PDF
5.[40 44]enhancing security in cloud computing
PDF
Security Issues in Cloud Computing by rahul abhishek
PDF
FOGCOMPUTING
PDF
G033030035
PDF
Cloud Computing Using Encryption and Intrusion Detection
PDF
Enhanced security framework to ensure data security
Fog doc
fog computing provide security to the data in cloud
5.[40 44]enhancing security in cloud computing
Security Issues in Cloud Computing by rahul abhishek
FOGCOMPUTING
G033030035
Cloud Computing Using Encryption and Intrusion Detection
Enhanced security framework to ensure data security

What's hot (18)

PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
A Study on Cloud and Fog Computing Security Issues and Solutions
PDF
A survey on data security in cloud computing issues and mitigation techniques
PDF
Encryption Technique for a Trusted Cloud Computing Environment
DOCX
Fog computing document
PDF
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
DOC
Security Issues in Cloud Computing by rahul abhishek
PDF
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
PDF
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PDF
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
PDF
Comparison of data security in grid and cloud
PDF
Ijarcet vol-2-issue-4-1405-1409
PDF
Comparison of data security in grid and cloud computing
PDF
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
PDF
Aes based secured framework for cloud databases
PPTX
Security in cloud computing
PDF
Cloud computing and security issues in the
Enhanced security framework to ensure data security in cloud using security b...
A Study on Cloud and Fog Computing Security Issues and Solutions
A survey on data security in cloud computing issues and mitigation techniques
Encryption Technique for a Trusted Cloud Computing Environment
Fog computing document
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
Security Issues in Cloud Computing by rahul abhishek
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
Secure data sharing in cloud computing using revocable storage identity-based...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
Comparison of data security in grid and cloud
Ijarcet vol-2-issue-4-1405-1409
Comparison of data security in grid and cloud computing
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Aes based secured framework for cloud databases
Security in cloud computing
Cloud computing and security issues in the
Ad

Viewers also liked (20)

PDF
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
PDF
Internal Retail Listings Management System
PDF
Fog-Computing-Virtualizing-Industry-White-Paper
PDF
2014 Technology_Disruption_Forum_SmartThings
PPTX
Microsoft RMS Agway and Southern States POS for Farm, Nursery, Lawn and Garde...
PDF
Draft: Payment Systems Bill
PPT
Oracle Retail Merchandise System
PDF
E-RETAIL SYSTEM_FINAL
PPTX
Onlne Retail Management By Jitendra
PPTX
cloud security using Fog Computing
PDF
National Retail Payment System and Proposed Payment Systems Act
PDF
Smart Sale Shop software presentation
PPT
Fog computing provide security to data in cloud ppt
PPTX
Loyalty Program Management System for Retail
PPTX
IoT, Fog Computing and the Blockchain
PDF
Retail management
PPTX
Why IoT needs Fog Computing ?
PDF
Fog Computing & Blockchain, la Killer App de l'IoT
PPTX
fog computing ppt
PPTX
Fog computing technology
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Internal Retail Listings Management System
Fog-Computing-Virtualizing-Industry-White-Paper
2014 Technology_Disruption_Forum_SmartThings
Microsoft RMS Agway and Southern States POS for Farm, Nursery, Lawn and Garde...
Draft: Payment Systems Bill
Oracle Retail Merchandise System
E-RETAIL SYSTEM_FINAL
Onlne Retail Management By Jitendra
cloud security using Fog Computing
National Retail Payment System and Proposed Payment Systems Act
Smart Sale Shop software presentation
Fog computing provide security to data in cloud ppt
Loyalty Program Management System for Retail
IoT, Fog Computing and the Blockchain
Retail management
Why IoT needs Fog Computing ?
Fog Computing & Blockchain, la Killer App de l'IoT
fog computing ppt
Fog computing technology
Ad

Similar to Fog computing a new concept to minimize the attacks and to provide security in cloud computing environment (20)

PDF
Hindering data theft attack through fog computing
PDF
Securing Cloud Using Fog: A Review
PDF
Fog computing
PDF
Science international journal
PDF
Secure Fog Computing System using Emoticon Technique
PPTX
Cloud security
PDF
Implementation of user authentication as a service for cloud network
PDF
Implementation_of_User_Authentication_as
PPTX
FOG COMPUTING- Presentation
PDF
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
DOCX
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
PDF
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
PDF
Eb31854857
PDF
Iaetsd cloud computing and security challenges
PDF
B1802041217
PDF
Analysis of Cloud Computing Security Concerns and Methodologies
PPTX
seminar ppt fogcomputing-170420185314 (1).pptx
PDF
IRJET- Security Concern: Analysis of Cloud Security Mechanism
PPTX
Seminar ppt fog comp
PPTX
seminarpptfogcomp-170420185314.pptx
Hindering data theft attack through fog computing
Securing Cloud Using Fog: A Review
Fog computing
Science international journal
Secure Fog Computing System using Emoticon Technique
Cloud security
Implementation of user authentication as a service for cloud network
Implementation_of_User_Authentication_as
FOG COMPUTING- Presentation
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
Eb31854857
Iaetsd cloud computing and security challenges
B1802041217
Analysis of Cloud Computing Security Concerns and Methodologies
seminar ppt fogcomputing-170420185314 (1).pptx
IRJET- Security Concern: Analysis of Cloud Security Mechanism
Seminar ppt fog comp
seminarpptfogcomp-170420185314.pptx

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Assessment of seismic susceptibility of rc buildings
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Low cost wireless sensor networks and smartphone applications for disaster ma...
Coastal zones – seismic vulnerability an analysis from east coast of india
Can fracture mechanics predict damage due disaster of structures
Assessment of seismic susceptibility of rc buildings
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Digital Logic Computer Design lecture notes
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Welding lecture in detail for understanding
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
Internet of Things (IOT) - A guide to understanding
PPT
Project quality management in manufacturing
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Well-logging-methods_new................
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Lecture Notes Electrical Wiring System Components
additive manufacturing of ss316l using mig welding
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Digital Logic Computer Design lecture notes
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Strings in CPP - Strings in C++ are sequences of characters used to store and...
OOP with Java - Java Introduction (Basics)
Welding lecture in detail for understanding
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Foundation to blockchain - A guide to Blockchain Tech
Lesson 3_Tessellation.pptx finite Mathematics
Internet of Things (IOT) - A guide to understanding
Project quality management in manufacturing
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Well-logging-methods_new................
Operating System & Kernel Study Guide-1 - converted.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Lecture Notes Electrical Wiring System Components

Fog computing a new concept to minimize the attacks and to provide security in cloud computing environment

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 124 FOG COMPUTING: A NEW CONCEPT TO MINIMIZE THE ATTACKS AND TO PROVIDE SECURITY IN CLOUD COMPUTING ENVIRONMENT Sonali Khairnar1, Dhanashree Borkar2 1M.E, Department of CSE, JSPM’s Imperial college of Engineering and Research, Maharashtra, India 2B.E, Department of CSE, JSPM’s Imperial college of Engineering and Research, Maharashtra, India Abstract Cloud is basically a clusters of multiple dedicated servers attached within a network .Cloud Computing is a network based environment that focuses on sharing computations or resources. In cloud customers only pay for what they use and have not to pay for local resources which they need such as storage or infrastructure. so this is the main advantage of cloud computing and main reason for gaining popularity in todays world .Also cloud computing is one of the most exciting technology due to its ability to reduce cost associated with computing while increasing flexibility and scalability for computer processes .But in cloud the main problem that occurs is security .And now a days security and privacy both are main concern that needed to be considered. To overcome the problem of security we are introducing the new technique which is called as Fog Computing .Fog Computing is not a replacement of cloud it is just extends the cloud computing by providing security in the cloud environment. With Fog services we are able to enhance the cloud experience by isolating users data that need to live on the edge. The main aim of fog computing is to place the data close to the end user. Keywords: Cloud, Cloud Computing, Decoys, Fog Computing. ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION In today's worlds the small as well as big -big organizations are using cloud computing technology to protect their data and to use the cloud resources as and when they need . Cloud is a subscription based service .Cloud computing is a shared pool of resources. The way of use computers and store our personal and business information can arises new data security challenges. Encryption mechanisms not protect the data in the cloud from unauthorized access. As we know that the traditional database system are usually deployed in closed environment where user can access the system only through a restricted network or internet. With the fast growth of W.W.W user can access virtually any database for which they have proper access right from anywhere in the world . By registering into cloud the users are ready to get the resources from cloud providers and the organization can access their data from anywhere and at any time when they need. But this comfortness comes with certain type of risk like security and privacy. To overcome by this problem we are using a new technique called as fog computing. Fog computing provides security in cloud environment in a greater extend to get the benefit of this technique a user need to get registered with the fog. once the user is ready by filling up the sign up form he will get the msg or email that he is ready to take the services from fog computing. 1.1 Existing System Existing data protection mechanisms such as encryption was failed in securing the data from the attackers. It does not verify whether the user was authorized or not. Cloud computing security does not focus on ways of secure the data from unauthorized access. Encryption does not provide much security to our data. In 2009 We have our own confidential documents in the cloud. This files does not have much security. So, hacker gains access the documents. Twitter incident is one example of a data theft attack in the Cloud. Difficult to find the attacker. In 2010 and 2011 Cloud computing security was developed against attackers. Finding of hackers in the cloud. Additionally, it shows that recent research results that might be useful to protect data in the cloud. 1.2 Proposed System We proposed a completely new technique to secure user‟s data in cloud using user behavior and decoy information technology called as Fog Computing. We use this techniques to provide data security in the cloud . A different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. In this technique when the unauthorized person try to access the data of the real user the system generates the fake documents in such a way that the unauthorized person was also not able to identify that the data is fake or real .It is identified thought a question which is entered by the real user at the time of filling the sign up form. If the answer of the question is wrong it means the user is not the real user and the system provide the fake document else original documents will be provided by the system to the real user.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 125 2. SECURING CLOUDS USING FOG There are various ways to use cloud services to save or store files, documents and media in remote services that can be accessed whenever user connect to the Internet. The main problem in cloud is to maintain security for users data in way that guarantees only authenticated users and no one else gain access to that data. The issue of providing security to confidential information is core security problem, that it does not provide level of assurance most people desire. There are various methods to secure remote data in cloud using standard access control and encryption methods. It is good to say that all the standard approaches used for providing security have been demonstrated to fail from time to time for a variety of reasons, including faulty implementations, buggy code, insider attacks, mis- configured services, and the creative construction of effective and sophisticated attacks not envisioned by the implementers of security procedures. Building a secure and trustworthy cloud computing environment is not enough, because attacks on data continue to happen, and when they do, and information gets lost, there is no way to get it back. There is needs to get solutions to such accidents. The basic idea is that we can limit the damage of stolen data if we decrease the value of that stolen data to the attacker. We can achieve this through a „preventive‟ decoy (disinformation) attack. We can secure Cloud services by implementing given additional security features. 2.1 Decoy System Decoy data, such as decoy documents, honeypots and other bogus information can be generated on demand and used for detecting unauthorized access to information and to „poison‟ the thief‟s ex-filtrated information. Serving decoys will confuse an attacker into believing they have ex-filtrated useful information, when they have not. This technology may be integrated with user behavior profiling technology to secure a user‟s data in the Cloud. . Whenever abnormal and unauthorized access to a cloud service is noticed, decoy information may be returned by the Cloud and delivered in such a waythat it appear completely normal and legitimate. The legitimate user, who is the owner of the information, would readily identify when decoy information is being returned by the Cloud, and hence could alter the Cloud‟s responses through a variety of means, such as challenge questions, to inform the Cloud security system that it has incorrectly detected an unauthorized access. In the case where the access is correctly identified as an unauthorized access, the Cloud security system would deliver unbounded amounts of bogus information to the attacker, thus securing the user‟s true data from can be implemented by given two additional security features: (1) validating whether data access is authorized when abnormal information access is detected, and (2) confusing the attacker with bogus information that is by providing decoy documents. Fig -1: Decoy System SystemUSERUSER PROFILINGATTACKER IDENTIFICATIONDECOY DOCUMENTORIGNAL DOCUMENT
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 126 We have applied above concepts to detect unauthorized data access to data stored on a local file system by masqueraders, i.e. attackers who view of legitimate users after stealing their credentials. Our experimental results in a local file system setting show that combining both techniques can yield better detection results .This results suggest that this approach may work in a Cloud environment, to make cloud system more transparent to the user as a local file system. 3. FOG COMPUTING Fog Computing system is trying to work against the attacker specially malicious insider. Here malicious insider means Insider attacks can be performed by malicious employees at the providers or users site. Malicious insider can access the confidential data of cloud users. A malicious insider can easily obtain passwords, cryptographic keys and files. The threat of malicious attacks has increased due to lack of transparency in cloud providers processes and procedures . It means that a provider may not know how employees are granted access and how this access is monitored or how reports as well as policy compliances are analyzed. Fig -2: Architecture of Fog Computing Above fig. states the actual working of the fog computing .In two ways login is done in system that are admin login and user login .When admin login to the system there are again two steps to follow: step1:Enter username step2:Enter the password . After successful login of admin he can perform all admin related tasks, but while downloading any file from fog he have to answer the security Question if he answer it correctly then only original file can be download. In other case ,when admin or user answer incorrectly to the security question then decoy document (fake document) is provided to the fake user . Decoy technology work in the given manner if you have any word ,suppose “MADAM” in the document then some alphabets are replaced as M->A then the given word become “AADAA” which have no meaning. In some Case ,if attacker getting to know that „M‟ is replaced by „A‟ in the given document and by applying reverse engineering he get result as “MMDMM”. In any case he can‟t judge content of document. ADMINUSERLOGINSIGN UPLOGINADMIN OPERATIONSENTER USERNAMEENTER PASSWORDANSWER TO QUESTIONUPLOAD FILESVIEW MY FILESSEND MESSAGESEND MAILDOWNLOAD FILESSHARE FILEFOG COMPUTINGORIGNAL DOCUMENTSDECOY DOCUMENTS
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 127 When user login to the system he also have to follow the same procedure as admin. Operations like upload files/documents, download files/documents, view alerts, send message, read message, broadcast any message all these can be perform by the user. ALERT this stream provide the detail knowledge of attack done on their personal file/document with details like date, time, no of times the attacker trying to hack that file/document .Best thing of fog Computing is after each successful login the user get SMS on the mobile that „login successful‟. from this the user get alert when other else trying to gain access to his/her personal fog account and when attacker trying to download some files/documents then user also get SMS that contain attacker ip-address, attacker‟s server name, date, time details on his/her mobile so that become easy to catch attacker by tracing all these things. In this way fog computing is more secure than the traditional cloud computing. 4. CONCLUSIONS The system was developed only with email provision but we have also implemented the SMS technique. In Fog Computing we presenting a new approach for solving the problem of insider data theft attacks in a cloud using dynamically generated decoy files and also saving storage required for maintaining decoy files in the cloud. So by using decoy technique in Fog can minimize insider attacks in cloud. REFERENCES [1]. Cloud Computing for Dummies [2]. Prevention Of Malicious Insider In The Cloud Using Decoy Documents by S. Muqtyar Ahmed, P. Namratha, C. Nagesh [3]. Cloud Security: Attacks and Current Defenses Gehana Booth, Andrew Soknacki, and Anil Somayaji [4]. Overview of Attacks on Cloud Computing by Ajey Singh, Dr. Maneesh Shrivastava BIOGRAPHIES Sonali Khairnar is lecturer of JSPM‟s Imperial College of Engineering and Research, Pune, MH, INDIA. She has received M.E Degree Computer Science and Engineering, Her main research interest includes Cloud Computing, Databases. Dhanashree Borkar is Student of JSPM‟s Imperial College of Engineering and Research, Pune, MH, INDIA. Currently appeared for B.E Degree Computer Science and Engineering, Her main research interest includes Cloud Computing and Fog Computing.