| 1 | Title of the Article | Survey on Fog Computing Mitigating Data Theft Attacks in Cloud |
| 2 | Author's name | Viraj Girish Mandlekar : (Student),Final year (BE Computer) Sandip Institute of Technology & Research Center, Nashik |
| 3 | Author's name | Vireshkumar Mahale , Sanket Satish Sancheti , Maaz Shad Rais |
| 4 | Subject | Computer Science & Engineering |
| 5 | Keyword(s) | Cloud, encryption, decoys behavior profiling, blowfish, aes, rsa. |
| 6 | Abstract | Cloud computing now-a-days forms a very important unit in the online world, by modifying how the computers and Internet were used few years back. Cloud computing provides the facility to store personal information and the information related to the business firms along with its access from anywhere in the world. In event of providing the facility cloud has many drawbacks related to its security which is mainly termed as data theft attacks. Especially these drawbacks are more offensive when done by an insider. So to overcome these drawbacks we are proposing a new technology called Fog Computing. Fog Computing forms a single unit by dealing with two different technologies i.e. User Behavior Profiling and Decoy Information Technology. Using these technologies we detect the behavior of the user and compare it with the normal user behavior. Along with this we provide authentication by various challenge questions so that hacking the login credentials does not log into the account. Besides this if any unauthorized access is detected providing with the fake data so that real data should be saved from hacking. Thus provides higher levels of security to the cloud. |
| 7 | Publisher | Innovative Research Publication |
| 8 | Journal Name; vol., no. | International Journal of Innovative Research in Computer Science & Technology (IJIRCST); Volume-2 Issue-6 |
| 9 | Publication Date | November 2014 |
| 10 | Type | Peer-reviewed Article |
| 11 | Format | |
| 12 | Uniform Resource Identifier | https://ijircst.org/view_abstract.php?title=Survey-on-Fog-Computing-Mitigating-Data-Theft-Attacks-in-Cloud&year=2014&vol=2&primary=QVJULTExMQ== |
| 13 | Digital Object Identifier(DOI) | |
| 14 | Language | English |
| 15 | Page No | 13-16 |