SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
FOG COMPUTING
CONTENTS
Abstract
Existing System
Disadvantages
Proposed System
Architecture
Conclusion
Future scope
ABSTRACT
Fog computing is not a replacement of cloud it is just extends
the cloud computing by providing security in the cloud
environment.
Cloud computing promises to significantly change the way of
use computers and store our personal and business information
can arises new data security challenges. Encryption
mechanisms not protect the data in the cloud from unauthorized
access.
 We proposed a different approach for securing data in the cloud
using offensive decoy technology. We monitor data access in
the cloud and detect abnormal data access patterns.
EXISTING SYSTEM
 In Existing data protection mechanisms such as encryption was
failed in securing the data from the attacker. It does not verify
whether the user was authorized or not.
 Cloud computing security does not focus on ways of secure the
data from unauthorized access.
In 2009 we have our own confidential documents in the cloud.
This file does not have much security. so, hacker gains access
the documents. Twitter incident is one example of a data theft
attack in the Cloud.
DISADVANTAGES
No body is identified when the attack is happen.
It is complex to detect which user is attack.
We can not detect which file was hacking.
PROPOSED SYSTEM
We proposed a completely new technique to secure user’s
data in cloud using user behavior and Decay information
technology called as fog computing.
 In this technique when the unauthorized person try to access
the data of the real user the system generates the fake
documents in such a way that the unauthorized person was
also not able to identify the data is fake or real
USER BEHAVIOR PROFILING
Admin monitor data access in the cloud and notice
abnormal data access patterns User profiling will a well
known Technique that can be applied here to check
how, when, and how much a client access their data in
the Cloud.
 This method of behavior based security will regularly
used in scheme uncovering applications.
DECOY SYSTEM
We suggest a different approach for securing data in
the cloud using nasty decoy technology.
 We monitor data access in the cloud and sense
irregular data access patterns.
We use this technology to begin disinformation
attacks against malicious insiders, preventing them
from distinguishing the valid aware customer data
from bogus useless.
DECOY SYSTEM
DECOY SYSTEM ADVANTAGES
The decoys, then, serve two purpose
Validating whether data access is authorized when
abnormal information access is detected.
 Confusing the attacker with bogus information
ARCHITECTURE
CONCLUSION
The system was developed only with email provision
but we have also implemented the SMS technique. In
Fog Computing we presenting a new approach for
solving the problem of insider data theft attacks in a
cloud using dynamically generated decoy files and also
saving storage required for maintaining decoy files in
the cloud. So by using decoy technique in Fog can
minimize insider attacks in cloud..
FUTURE SCOPE
In our future work, this security system as we have
explained is applicable only for single cloud ownership
system. If the cloud owner has a more than one clouds to
operate then our security system will not be applicable for
providing security, therefore in the future enhancement
we can enhance our existing application to manage a
cloud environment which has more than one cloud
architecture.
 Cloud computing is the future for organizations.
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt

More Related Content

What's hot (20)

DOCX
fog computing provide security to the data in cloud
priyanka reddy
 
PPTX
Fog computing 000
pranjali rawke
 
PDF
Fog computing
Mahantesh Hiremath
 
PPTX
Fog computing technology
Nikhil Sabu
 
PPTX
Fog computing
Parmeshwar Wahatule
 
PPTX
Fog computing
Ankit_ap
 
PPTX
Data storage security in cloud computing
Sonali Jain
 
PPTX
Edge computing
pramiidhaaavula
 
PPTX
fog computing ppt
sravya raju
 
PDF
Fog Computing
Joud Khattab
 
PDF
Cloud, Fog & Edge Computing
EUBrasilCloudFORUM .
 
PPTX
Fog Computing
Pachipulusu Giridhar
 
DOCX
Fog computing document
sravya raju
 
PPT
Security Issues of Cloud Computing
Falgun Rathod
 
PPT
Cloud computing
Syam Lal
 
PDF
IoT Meets the Cloud: The Origins of Edge Computing
Maria Gorlatova
 
PPTX
Seminar ppt fog comp
Mahantesh Hiremath
 
PPTX
Fog computing
Ayush Chaurasia
 
PPT
Fog computing
Valarmathi Srinivasan
 
PDF
Edge Computing : future of IoT ?
Samir Bounab
 
fog computing provide security to the data in cloud
priyanka reddy
 
Fog computing 000
pranjali rawke
 
Fog computing
Mahantesh Hiremath
 
Fog computing technology
Nikhil Sabu
 
Fog computing
Parmeshwar Wahatule
 
Fog computing
Ankit_ap
 
Data storage security in cloud computing
Sonali Jain
 
Edge computing
pramiidhaaavula
 
fog computing ppt
sravya raju
 
Fog Computing
Joud Khattab
 
Cloud, Fog & Edge Computing
EUBrasilCloudFORUM .
 
Fog Computing
Pachipulusu Giridhar
 
Fog computing document
sravya raju
 
Security Issues of Cloud Computing
Falgun Rathod
 
Cloud computing
Syam Lal
 
IoT Meets the Cloud: The Origins of Edge Computing
Maria Gorlatova
 
Seminar ppt fog comp
Mahantesh Hiremath
 
Fog computing
Ayush Chaurasia
 
Fog computing
Valarmathi Srinivasan
 
Edge Computing : future of IoT ?
Samir Bounab
 

Viewers also liked (20)

DOCX
What is fog computing
Ahmed Banafa
 
PDF
Big Data at DYNO
Tu Pham
 
PPTX
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
Ulf Mattsson
 
PPT
Cloud Computing - Benefits and Risks
Michael Yung
 
PDF
Disadvantages of Cloud Computing
Maikel Mardjan
 
PDF
System Security on Cloud
Tu Pham
 
PDF
Fog Computing with VORTEX
Angelo Corsaro
 
PDF
Latest Thesis Topics for Fog computing
Thesis Scientist Private Limited
 
PDF
Face detection issues
Mohamed Sol Al Okaily
 
PDF
Security Issues of IoT with Fog
Achu Anna
 
PPTX
cloud security using Fog Computing
archana lisbon
 
PDF
Internet of Things (IOT) - Technology and Applications
Dr. Mazlan Abbas
 
PDF
Overview of IoT and Security issues
Anastasios Economides
 
PDF
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
 
PPT
Cloud computing ppt
Datta Dharanikota
 
PDF
What is the Internet of Things?
Felix Grovit
 
PDF
Security in the Internet of Things
ForgeRock
 
PDF
What exactly is the "Internet of Things"?
Dr. Mazlan Abbas
 
PPT
Internet of Things and its applications
Pasquale Puzio
 
PDF
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
What is fog computing
Ahmed Banafa
 
Big Data at DYNO
Tu Pham
 
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
Ulf Mattsson
 
Cloud Computing - Benefits and Risks
Michael Yung
 
Disadvantages of Cloud Computing
Maikel Mardjan
 
System Security on Cloud
Tu Pham
 
Fog Computing with VORTEX
Angelo Corsaro
 
Latest Thesis Topics for Fog computing
Thesis Scientist Private Limited
 
Face detection issues
Mohamed Sol Al Okaily
 
Security Issues of IoT with Fog
Achu Anna
 
cloud security using Fog Computing
archana lisbon
 
Internet of Things (IOT) - Technology and Applications
Dr. Mazlan Abbas
 
Overview of IoT and Security issues
Anastasios Economides
 
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
 
Cloud computing ppt
Datta Dharanikota
 
What is the Internet of Things?
Felix Grovit
 
Security in the Internet of Things
ForgeRock
 
What exactly is the "Internet of Things"?
Dr. Mazlan Abbas
 
Internet of Things and its applications
Pasquale Puzio
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
Ad

Similar to Fog computing provide security to data in cloud ppt (20)

PDF
Fog computing a new concept to minimize the attacks and to provide security i...
eSAT Publishing House
 
PDF
Hindering data theft attack through fog computing
eSAT Publishing House
 
PDF
Securing Cloud Using Fog: A Review
IRJET Journal
 
PDF
FOGCOMPUTING
Anvesh Kolluri
 
PPTX
Fog Computing
Mohit Jaju
 
PPTX
project 11
K L University
 
PDF
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
IJSRD
 
PPTX
seminar ppt fogcomputing-170420185314 (1).pptx
mamtadm1975
 
PPTX
seminarpptfogcomp-170420185314.pptx
PrasannaKumarpanda2
 
DOCX
Fog doc
priyanka reddy
 
PDF
Secure Fog Computing System using Emoticon Technique
rahulmonikasharma
 
PPTX
Fog ppt
sabafarheen
 
PDF
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET Journal
 
PDF
A Study on Cloud and Fog Computing Security Issues and Solutions
AM Publications
 
PDF
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
 
PDF
Computing_Paradigms_An_Overview.pdf
HODCS6
 
PDF
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET Journal
 
PPTX
Fog computing veera vutti
veera vutti
 
Fog computing a new concept to minimize the attacks and to provide security i...
eSAT Publishing House
 
Hindering data theft attack through fog computing
eSAT Publishing House
 
Securing Cloud Using Fog: A Review
IRJET Journal
 
FOGCOMPUTING
Anvesh Kolluri
 
Fog Computing
Mohit Jaju
 
project 11
K L University
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
IJSRD
 
seminar ppt fogcomputing-170420185314 (1).pptx
mamtadm1975
 
seminarpptfogcomp-170420185314.pptx
PrasannaKumarpanda2
 
Fog doc
priyanka reddy
 
Secure Fog Computing System using Emoticon Technique
rahulmonikasharma
 
Fog ppt
sabafarheen
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET Journal
 
A Study on Cloud and Fog Computing Security Issues and Solutions
AM Publications
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
 
Computing_Paradigms_An_Overview.pdf
HODCS6
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET Journal
 
Fog computing veera vutti
veera vutti
 
Ad

More from priyanka reddy (6)

DOCX
Cyborg techseminar
priyanka reddy
 
DOCX
3 d searching document
priyanka reddy
 
DOCX
Mirror doc
priyanka reddy
 
PPT
Mirror link
priyanka reddy
 
PPTX
5 pen pc technology ppt for seminor
priyanka reddy
 
PPTX
E ball technology ppt
priyanka reddy
 
Cyborg techseminar
priyanka reddy
 
3 d searching document
priyanka reddy
 
Mirror doc
priyanka reddy
 
Mirror link
priyanka reddy
 
5 pen pc technology ppt for seminor
priyanka reddy
 
E ball technology ppt
priyanka reddy
 

Fog computing provide security to data in cloud ppt

  • 3. ABSTRACT Fog computing is not a replacement of cloud it is just extends the cloud computing by providing security in the cloud environment. Cloud computing promises to significantly change the way of use computers and store our personal and business information can arises new data security challenges. Encryption mechanisms not protect the data in the cloud from unauthorized access.  We proposed a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns.
  • 4. EXISTING SYSTEM  In Existing data protection mechanisms such as encryption was failed in securing the data from the attacker. It does not verify whether the user was authorized or not.  Cloud computing security does not focus on ways of secure the data from unauthorized access. In 2009 we have our own confidential documents in the cloud. This file does not have much security. so, hacker gains access the documents. Twitter incident is one example of a data theft attack in the Cloud.
  • 5. DISADVANTAGES No body is identified when the attack is happen. It is complex to detect which user is attack. We can not detect which file was hacking.
  • 6. PROPOSED SYSTEM We proposed a completely new technique to secure user’s data in cloud using user behavior and Decay information technology called as fog computing.  In this technique when the unauthorized person try to access the data of the real user the system generates the fake documents in such a way that the unauthorized person was also not able to identify the data is fake or real
  • 7. USER BEHAVIOR PROFILING Admin monitor data access in the cloud and notice abnormal data access patterns User profiling will a well known Technique that can be applied here to check how, when, and how much a client access their data in the Cloud.  This method of behavior based security will regularly used in scheme uncovering applications.
  • 8. DECOY SYSTEM We suggest a different approach for securing data in the cloud using nasty decoy technology.  We monitor data access in the cloud and sense irregular data access patterns. We use this technology to begin disinformation attacks against malicious insiders, preventing them from distinguishing the valid aware customer data from bogus useless.
  • 10. DECOY SYSTEM ADVANTAGES The decoys, then, serve two purpose Validating whether data access is authorized when abnormal information access is detected.  Confusing the attacker with bogus information
  • 12. CONCLUSION The system was developed only with email provision but we have also implemented the SMS technique. In Fog Computing we presenting a new approach for solving the problem of insider data theft attacks in a cloud using dynamically generated decoy files and also saving storage required for maintaining decoy files in the cloud. So by using decoy technique in Fog can minimize insider attacks in cloud..
  • 13. FUTURE SCOPE In our future work, this security system as we have explained is applicable only for single cloud ownership system. If the cloud owner has a more than one clouds to operate then our security system will not be applicable for providing security, therefore in the future enhancement we can enhance our existing application to manage a cloud environment which has more than one cloud architecture.  Cloud computing is the future for organizations.